Sahin et al., 2017 - Google Patents
An efficient firewall for web applications (EFWA)Sahin et al., 2017
- Document ID
- 11155366932481268556
- Author
- Sahin M
- Sogukpınar I
- Publication year
- Publication venue
- 2017 International Conference on Computer Science and Engineering (UBMK)
External Links
Snippet
Today, with the development of technology, communication tools like computers, phones, tablets and etc. use the http as default protocol. The fact that large data stream transactions are over the http protocol has caused this protocol to become a target for attackers. It is …
- 238000002347 injection 0 abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abdallah et al. | Intrusion detection systems using supervised machine learning techniques: a survey | |
Jemal et al. | Sql injection attack detection and prevention techniques using machine learning | |
Nasereddin et al. | A systematic review of detection and prevention techniques of SQL injection attacks | |
Parrend et al. | Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection | |
Tripathy et al. | Detecting SQL injection attacks in cloud SaaS using machine learning | |
Gao et al. | Ontology-based model of network and computer attacks for security assessment | |
Zhang et al. | SQL injection detection based on deep belief network | |
Min | An analysis of K-means algorithm based network intrusion detection system | |
Jiang et al. | Sok: Applying machine learning in security-a survey | |
Quezada et al. | Real-time bot infection detection system using DNS fingerprinting and machine-learning | |
Chen et al. | A categorization framework for common computer vulnerabilities and exposures | |
Zang et al. | Attack scenario reconstruction via fusing heterogeneous threat intelligence | |
Alkhathami et al. | Detection of SQL injection attacks using machine learning in cloud computing platform | |
Lodeiro-Santiago et al. | Collaborative SQL-injections detection system with machine learning | |
Eom et al. | A framework of defense system for prevention of insider's malicious behaviors | |
Niranjan et al. | Security in data mining-a comprehensive survey | |
Salih et al. | Cyber security: performance analysis and challenges for cyber attacks detection | |
Suraj et al. | Big data analytics of cyber attacks: a review | |
Sahin et al. | An efficient firewall for web applications (EFWA) | |
Wen et al. | Detecting and predicting APT based on the study of cyber kill chain with hierarchical knowledge reasoning | |
Kakavand et al. | O-ADPI: online adaptive deep-packet inspector using Mahalanobis distance map for web service attacks classification | |
Liu et al. | A Markov detection tree-based centralized scheme to automatically identify malicious webpages on cloud platforms | |
Anand et al. | A comprehensive study of DDoS attack on internet of things network | |
Zonta et al. | A Holistic Review on Detection of Malicious Browser Extensions and Links using Deep Learning | |
Raut | Log based intrusion detection system |