[go: up one dir, main page]

Kapodistria et al., 2011 - Google Patents

An advanced web attack detection and prevention tool

Kapodistria et al., 2011

View PDF
Document ID
9238780804139121045
Author
Kapodistria H
Mitropoulos S
Douligeris C
Publication year
Publication venue
Information Management & Computer Security

External Links

Snippet

Purpose–The purpose of this paper is to introduce a new tool which detects, prevents and records common web attacks that mainly result in web applications information leaking using pattern recognition. It is a cross‐platform application, namely, it is not OS‐dependent …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links

Similar Documents

Publication Publication Date Title
US10868819B2 (en) Systems for detecting a headless browser executing on a client computer
Kirda et al. Noxes: a client-side solution for mitigating cross-site scripting attacks
Li et al. A survey on server-side approaches to securing web applications
Sadqi et al. A systematic review and taxonomy of web applications threats
EP2513800B1 (en) Methods and systems of detecting and analyzing correlated operations in a common storage
Nithya et al. A survey on detection and prevention of cross-site scripting attack
Li et al. A survey on web application security
Shahriar et al. Client-side detection of cross-site request forgery attacks
Ravindran et al. A Review on Web Application Vulnerability Assessment and Penetration Testing.
Kapodistria et al. An advanced web attack detection and prevention tool
Nagpal et al. SECSIX: security engine for CSRF, SQL injection and XSS attacks
Spett Cross-site scripting
Katkar Anjali et al. Web vulnerability detection and security mechanism
Kirchner et al. Dancer in the dark: Synthesizing and evaluating polyglots for blind {Cross-Site} scripting
Dharam et al. Runtime monitoring technique to handle tautology based SQL injection attacks
Xia et al. WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets
Hammoudeh et al. The study on assessment of security web applications
Zhao et al. Large-scale detection of privacy leaks for BAT browsers extensions in China
Nunes Blended security analysis for web applications: Techniques and tools
Jayaraman et al. Enforcing request integrity in web applications
Izagirre Deception strategies for web application security: application-layer approaches and a testing platform
al Azmi et al. A comprehensive research on XSS scripting attacks on different domains and their verticals
Pevnev et al. Web application protection technologies
Zhou et al. Strengthening XSRF defenses for legacy web applications using whitebox analysis and transformation
Alanda et al. Cross-Site Scripting (XSS) Vulnerabilities in Modern Web Applications