We present ongoing work about how the use of diverse tools may help with detecting malicious web scraping behavior. We use a real dataset of Apache HTTP Access logs for an e-commerce application provided by Amadeus, a large multinational IT provider for the global travel and tourism industry. Two tools have been used to detect scraping activities based on the HTTP requests: a commercial tool, and an in-house tool called Arcane. Preliminary results suggest there is considerable diversity in alerting behavior of these tools
International audienceMalicious web pages that host drive-by-download exploits have become a popular...
The number of attacks is increasing day by day, especially the web attacks due to the shift of the m...
HTTP is a popular channel for malware to communicate with malicious servers (e.g., Command & Control...
We present results on the use of diverse monitoring tools for the detection of malicious web scrapin...
Currently, we are witnessing a significant rise in various types of malware, which has an impact not...
Large-scale Internet scanning has become increasingly common in the research community shedding ligh...
The steady evolution of the Web has paved the way for mis-creants to take advantage of vulnerabiliti...
In this age of ubiquitous communication in which we can stay constantly connected with the rest of t...
Automated programs (bots) are responsible for a large percentage of website traffic. These bots can ...
The Web has evolved from a handful of static web pages to billions of dynamic and interactive web pa...
The steady evolution of the Web has paved the way for miscreants to take advantage of vulnerabilitie...
Internet services are more necessary part of our daily life. We rely growingly on the ease and flexi...
Malicious URL detection is an important task in Internet security intelligence. Existing works rely ...
The article deals with a study of web-crawler behaviour on different websites. A classification of w...
Many web application security problems related to intrusion have resulted from the rapid development...
International audienceMalicious web pages that host drive-by-download exploits have become a popular...
The number of attacks is increasing day by day, especially the web attacks due to the shift of the m...
HTTP is a popular channel for malware to communicate with malicious servers (e.g., Command & Control...
We present results on the use of diverse monitoring tools for the detection of malicious web scrapin...
Currently, we are witnessing a significant rise in various types of malware, which has an impact not...
Large-scale Internet scanning has become increasingly common in the research community shedding ligh...
The steady evolution of the Web has paved the way for mis-creants to take advantage of vulnerabiliti...
In this age of ubiquitous communication in which we can stay constantly connected with the rest of t...
Automated programs (bots) are responsible for a large percentage of website traffic. These bots can ...
The Web has evolved from a handful of static web pages to billions of dynamic and interactive web pa...
The steady evolution of the Web has paved the way for miscreants to take advantage of vulnerabilitie...
Internet services are more necessary part of our daily life. We rely growingly on the ease and flexi...
Malicious URL detection is an important task in Internet security intelligence. Existing works rely ...
The article deals with a study of web-crawler behaviour on different websites. A classification of w...
Many web application security problems related to intrusion have resulted from the rapid development...
International audienceMalicious web pages that host drive-by-download exploits have become a popular...
The number of attacks is increasing day by day, especially the web attacks due to the shift of the m...
HTTP is a popular channel for malware to communicate with malicious servers (e.g., Command & Control...