[go: up one dir, main page]

Sahin et al., 2017 - Google Patents

An efficient firewall for web applications (EFWA)

Sahin et al., 2017

Document ID
11155366932481268556
Author
Sahin M
Sogukpınar I
Publication year
Publication venue
2017 International Conference on Computer Science and Engineering (UBMK)

External Links

Snippet

Today, with the development of technology, communication tools like computers, phones, tablets and etc. use the http as default protocol. The fact that large data stream transactions are over the http protocol has caused this protocol to become a target for attackers. It is …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
Abdallah et al. Intrusion detection systems using supervised machine learning techniques: a survey
Jemal et al. Sql injection attack detection and prevention techniques using machine learning
Nasereddin et al. A systematic review of detection and prevention techniques of SQL injection attacks
Parrend et al. Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection
Tripathy et al. Detecting SQL injection attacks in cloud SaaS using machine learning
Gao et al. Ontology-based model of network and computer attacks for security assessment
Zhang et al. SQL injection detection based on deep belief network
Min An analysis of K-means algorithm based network intrusion detection system
Jiang et al. Sok: Applying machine learning in security-a survey
Quezada et al. Real-time bot infection detection system using DNS fingerprinting and machine-learning
Chen et al. A categorization framework for common computer vulnerabilities and exposures
Zang et al. Attack scenario reconstruction via fusing heterogeneous threat intelligence
Alkhathami et al. Detection of SQL injection attacks using machine learning in cloud computing platform
Lodeiro-Santiago et al. Collaborative SQL-injections detection system with machine learning
Eom et al. A framework of defense system for prevention of insider's malicious behaviors
Niranjan et al. Security in data mining-a comprehensive survey
Salih et al. Cyber security: performance analysis and challenges for cyber attacks detection
Suraj et al. Big data analytics of cyber attacks: a review
Sahin et al. An efficient firewall for web applications (EFWA)
Wen et al. Detecting and predicting APT based on the study of cyber kill chain with hierarchical knowledge reasoning
Kakavand et al. O-ADPI: online adaptive deep-packet inspector using Mahalanobis distance map for web service attacks classification
Liu et al. A Markov detection tree-based centralized scheme to automatically identify malicious webpages on cloud platforms
Anand et al. A comprehensive study of DDoS attack on internet of things network
Zonta et al. A Holistic Review on Detection of Malicious Browser Extensions and Links using Deep Learning
Raut Log based intrusion detection system