메뉴 건너뛰기




Volumn 254, Issue , 2014, Pages 19-38

Semantic security against web application attacks

Author keywords

Application security; Semantic rule engine; Semantic security

Indexed keywords

COMPUTER CIRCUITS; DATA DESCRIPTION; ONTOLOGY; SEMANTICS; SPECIFICATIONS; WEB CRAWLER;

EID: 84885179737     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2013.08.007     Document Type: Article
Times cited : (57)

References (83)
  • 2
    • 84863446969 scopus 로고    scopus 로고
    • Detecting targeted malicious email
    • Rohan Amin, Julie Ryan, Johan van Dorp, Detecting targeted malicious email, Security & Privacy, IEEE 10 (3) (2012) 64-71.
    • (2012) Security & Privacy IEEE , vol.10 , Issue.3 , pp. 64-71
    • Amin, R.1    Ryan, J.2    Van Dorp, J.3
  • 3
    • 43449117487 scopus 로고    scopus 로고
    • Context based application level intrusion detection system, in: International conference on Networking and Services 2006
    • A. Anitha, V. Vaidehi, Context based application level intrusion detection system, in: International conference on Networking and Services, 2006, ICNS'06, IEEE, 2006, p. 16.
    • (2006) ICNS'06 IEEE , pp. 16
    • Anitha, A.1    Vaidehi, V.2
  • 4
    • 84871986666 scopus 로고    scopus 로고
    • Defending against web application vulnerabilities
    • Nuno Antunes, Marco Vieira, Defending against web application vulnerabilities, Computer (2012) 66-72.
    • Computer , vol.2012 , pp. 66-72
    • Antunes, N.1    Vieira, M.2
  • 5
    • 84862174649 scopus 로고    scopus 로고
    • Towards an ontological approach to information system security and safety requirement modeling and reuse
    • O.T. Arogundade, A.T. Akinwale, Z. Jin, X.G. Yang, Towards an ontological approach to information system security and safety requirement modeling and reuse, Information Security Journal: A Global Perspective 21 (3) (2012) 137-149.
    • (2012) Information Security Journal: A Global Perspective , vol.21 , Issue.3 , pp. 137-149
    • Arogundade, O.T.1    Akinwale, A.T.2    Jin, Z.3    Yang, X.G.4
  • 6
    • 78651230573 scopus 로고    scopus 로고
    • Anomaly detection using negative security model in web application, in: 2010 international conference on computer information systems and industrial management applications (cisim)
    • M. Auxilia, D. Tamilselvan, Anomaly detection using negative security model in web application, in: 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE, 2010, pp. 481-486.
    • (2010) IEEE , pp. 481-486
    • Auxilia, M.1    Tamilselvan, D.2
  • 8
    • 0017547820 scopus 로고
    • A fast string searching algorithm
    • R.S. Boyer, J.S. Moore, A fast string searching algorithm, Communications of the ACM 20 (10) (1977) 762-772.
    • (1977) Communications of the ACM , vol.20 , Issue.10 , pp. 762-772
    • Boyer, R.S.1    Moore, J.S.2
  • 9
    • 33646465922 scopus 로고    scopus 로고
    • Getting to the core of the matter, Strength
    • T.D. Brown, Getting to the core of the matter, Strength & Conditioning Journal 28 (2) (2006) 50.
    • (2006) Conditioning Journal , vol.28 , Issue.2 , pp. 50
    • Brown, T.D.1
  • 14
    • 33847315579 scopus 로고    scopus 로고
    • Reflection in membership equational logic, many-sorted equational logic, Horn logic with equality, and rewriting logic
    • DOI 10.1016/j.tcs.2006.12.009, PII S0304397506008991
    • Manuel Clavel, José Meseguer, Miguel Palomino, Reflection in membership equational logic, many-sorted equational logic, horn logic with equality, and rewriting logic, Theoretical Computer Science 373 (2007) 70-91. (Pubitemid 46330566)
    • (2007) Theoretical Computer Science , vol.373 , Issue.1-2 , pp. 70-91
    • Clavel, M.1    Meseguer, J.2    Palomino, M.3
  • 21
    • 84887254864 scopus 로고    scopus 로고
    • A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis
    • Nan Feng, Harry Jiannan Wang, Minqiang Li, A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis, Information Sciences (2013).
    • (2013) Information Sciences
    • Feng, N.1    Jiannan Wang, H.2    Li, M.3
  • 22
    • 50049109224 scopus 로고    scopus 로고
    • Information security fortification by ontological mapping of the iso/iec 27001 standard, in: 13th Pacific Rim International Symposium on
    • S. Fenz, G. Goluch, A. Ekelhart, B. Riedl, E. Weippl, Information security fortification by ontological mapping of the iso/iec 27001 standard, in: 13th Pacific Rim International Symposium on Dependable Computing, 2007, PRDC 2007, IEEE, 2007, pp. 381-388.
    • (2007) Dependable Computing 2007 PRDC 2007 IEEE , pp. 381-388
    • Fenz, S.1    Goluch, G.2    Ekelhart, A.3    Riedl, B.4    Weippl, E.5
  • 30
    • 0012257635 scopus 로고    scopus 로고
    • Evaluating ontological decisions with ontoclean
    • Nicola Guarino, Christopher Welty, Evaluating ontological decisions with ontoclean, Communications of the ACM 45 (2) (2002) 61-65. (Pubitemid 135699725)
    • (2002) Communications of the ACM , vol.45 , Issue.2 , pp. 61-65
    • Guarino, N.1    Welty, C.2
  • 31
    • 84855928597 scopus 로고    scopus 로고
    • Identity theft and financial fraud: Some strangeness in the proportions
    • Hal Berghel, Identity theft and financial fraud: Some strangeness in the proportions, Computer 45 (1) (2012) 86-89.
    • (2012) Computer , vol.45 , Issue.1 , pp. 86-89
    • Berghel, H.1
  • 32
    • 0031190959 scopus 로고    scopus 로고
    • Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions
    • B. Guha, B. Mukherjee, Network security via reverse engineering of tcp code: vulnerability analysis and proposed solutions, Network, IEEE 11 (4) (1997) 40-48. (Pubitemid 127603071)
    • (1997) IEEE Network , vol.11 , Issue.4 , pp. 40-48
    • Guha, B.1    Mukherjee, B.2
  • 34
    • 0001875510 scopus 로고    scopus 로고
    • Daml + oil: Adescription logic for the semantic web
    • I. Horrocks et al, Daml + oil: adescription logic for the semantic web, IEEE Data Engineering Bulletin 25 (1) (2002) 4-9.
    • (2002) IEEE Data Engineering Bulletin , vol.25 , Issue.1 , pp. 4-9
    • Horrocks Et Al, I.1
  • 39
    • 77957112438 scopus 로고    scopus 로고
    • Static analysis for detecting taint-style vulnerabilities in web applications
    • N. Jovanovic, C. Kruegel, E. Kirda, Static analysis for detecting taint-style vulnerabilities in web applications, Journal of Computer Security 18 (5) (2010) 861-907.
    • (2010) Journal of Computer Security , vol.18 , Issue.5 , pp. 861-907
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 41
    • 4344697279 scopus 로고    scopus 로고
    • Resource description framework (RDF): Concepts and abstract syntax
    • Graham Klyne, Jeremy J Carroll, Brian McBride, Resource description framework (RDF): concepts and abstract syntax, W3C Recommendation 10 (2004).
    • (2004) W3C Recommendation , vol.10
    • Klyne, G.1    Carroll, J.J.2    McBride, B.3
  • 45
    • 25144491719 scopus 로고    scopus 로고
    • NetGlean: A methodology for distributed network security scanning
    • DOI 10.1007/s10922-005-6263-2
    • G.W. Manes, D. Schulte, S. Guenther, S. Shenoi, Netglean: a methodology for distributed network security scanning, Journal of Network and Systems Management 13 (3) (2005) 329-344. (Pubitemid 41344140)
    • (2005) Journal of Network and Systems Management , vol.13 , Issue.3 , pp. 329-344
    • Manes, G.W.1    Schulte, D.2    Guenther, S.3    Shenoi, S.4
  • 46
    • 4344567256 scopus 로고    scopus 로고
    • Owl web ontology language overview
    • 2004-03
    • Deborah L McGuinness, Frank Van Harmelen, et al, Owl web ontology language overview, W3C Recommendation 10 (2004-03) (2004) 10.
    • (2004) W3C Recommendation , vol.10 , pp. 10
    • McGuinness, D.L.1    Van Harmelen, F.2
  • 47
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • J. McHugh, Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory, ACM Transactions on Information and System Security 3 (4) (2000) 262-294.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 51
    • 84860436315 scopus 로고    scopus 로고
    • Using rule ontology in repeated rule acquisition from similar web sites
    • Sangun Park, Juyoung Kang, Using rule ontology in repeated rule acquisition from similar web sites, IEEE Transactions on Knowledge and Data Engineering 24 (6) (2012) 1106-1119.
    • (2012) IEEE Transactions on Knowledge and Data Engineering 24 , vol.6 , pp. 1106-1119
    • Park, S.1    Kang, J.2
  • 58
    • 34248401104 scopus 로고    scopus 로고
    • Application layer intrusion detection for SQL injection
    • DOI 10.1145/1185448.1185564, Proceedings of the 44th ACM Southeast Conference, ACMSE 2006
    • F.S. Rietta, Application layer intrusion detection for sql injection, in: Proceedings of the 44th Annual Southeast Regional Conference, ACM, 2006, pp. 531-536. (Pubitemid 46733524)
    • (2006) Proceedings of the Annual Southeast Conference , vol.2006 , pp. 531-536
    • Rietta, F.S.1
  • 62
    • 84859165019 scopus 로고    scopus 로고
    • Knowledge discovery through ontology matching: An approach based on an artificial neural network model
    • M. Rubiolo, M.L. Caliusco, G. Stegmayer, M. Coronel, M. Gareli Fabrizi, Knowledge discovery through ontology matching: an approach based on an artificial neural network model, Information Sciences 194 (2012) 107-119.
    • (2012) Information Sciences , vol.194 , pp. 107-119
    • Rubiolo, M.1    Caliusco, M.L.2    Stegmayer, G.3    Coronel, M.4    Gareli Fabrizi, M.5
  • 64
    • 84861726546 scopus 로고    scopus 로고
    • Opcode sequences as representation of executables for data-mining-based unknown malware detection
    • Igor Santos, Felix Brezo, Xabier Ugarte-Pedrero, Pablo G Bringas, Opcode sequences as representation of executables for data-mining-based unknown malware detection, Information Sciences (2011).
    • (2011) Information Sciences
    • Santos, I.1    Brezo, F.2    Ugarte-Pedrero, X.3    Bringas, P.G.4
  • 65
    • 81855221782 scopus 로고    scopus 로고
    • Enhanced topic-based vector space model for semantics-Aware spam filtering
    • Igor Santos, Carlos Laorden, Borja Sanz, Pablo G Bringas, Enhanced topic-based vector space model for semantics-Aware spam filtering, Expert Systems with applications 39 (1) (2012) 437-444.
    • (2012) Expert Systems with Applications , vol.39 , Issue.1 , pp. 437-444
    • Santos, I.1    Laorden, C.2    Sanz, B.3    Bringas, P.G.4
  • 67
    • 84886364499 scopus 로고    scopus 로고
    • In-execution dynamic malware analysis and detection by mining information in process control blocks of linux os
    • Farrukh Shahzad, M. Shahzad, Muddassar Farooq, In-execution dynamic malware analysis and detection by mining information in process control blocks of linux os, Information Sciences (2011).
    • (2011) Information Sciences
    • Shahzad, F.1    Shahzad, M.2    Farooq, M.3
  • 68
    • 84858250036 scopus 로고    scopus 로고
    • Hee Beng Kuan Tan Defending against cross-site scripting attacks
    • Lwin Khin Shar, Hee Beng Kuan Tan, Defending against cross-site scripting attacks, Computer 45 (3) (2012) 55-62.
    • (2012) Computer , vol.45 , Issue.3 , pp. 55-62
    • Khin Shar, L.1
  • 70
    • 34249817069 scopus 로고    scopus 로고
    • Pellet: A practical OWL-DL reasoner
    • DOI 10.1016/j.websem.2007.03.004, PII S1570826807000169, Software Engineering and the Semantic Web
    • Evren Sirin, Bijan Parsia, Bernardo Cuenca Grau, Aditya Kalyanpur, Yarden Katz, Pellet: A practical owl-dl reasoner, Web Semantics: Science, Services and Agents on the World Wide Web 5 (2) (2007) 51-53. (Pubitemid 46856283)
    • (2007) Web Semantics , vol.5 , Issue.2 , pp. 51-53
    • Sirin, E.1    Parsia, B.2    Grau, B.C.3    Kalyanpur, A.4    Katz, Y.5
  • 71
  • 73
    • 84863343959 scopus 로고    scopus 로고
    • Opass: A user authentication protocol resistant to password stealing and password reuse attacks
    • Hung-Min Sun, Yao-Hsin Chen, Yue-Hsun Lin, opass: A user authentication protocol resistant to password stealing and password reuse attacks, IEEE Transactions on Information Forensics and Security 7 (2) (2012) 651-663.
    • (2012) IEEE Transactions on Information Forensics and Security , vol.7 , Issue.2 , pp. 651-663
    • Sun, H.1    Chen, Y.2    Lin, Y.3
  • 77
    • 84861603441 scopus 로고    scopus 로고
    • Ranking semantic relationships between two entities using personalization in context specification
    • V. Viswanathan, Ilango Krishnamurthi, Ranking semantic relationships between two entities using personalization in context specification, Information Sciences (2012).
    • (2012) Information Sciences
    • Viswanathan, V.1    Krishnamurthi, I.2
  • 79
    • 80054909543 scopus 로고    scopus 로고
    • Considerations regarding the security and protection of e-banking services consumers' interests
    • M. Vrancianu, L.A. Popa, Considerations regarding the security and protection of e-banking services consumers' interests, The Amfiteatru Economic Journal 12 (28) (2010) 388-403.
    • (2010) The Amfiteatru Economic Journal 12 , vol.28 , pp. 388-403
    • Vrancianu, M.1    Popa, L.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.