The article discusses the problem of detecting network attacks on a web server. The attention is focused on two common types of attacks: “denial of service„ and “code injection„. A review and an analysis of various attack detection techniques are conducted. A new lightweight approach to detect attacks as anomalies is proposed. It is based on recognition of the dynamic response of the web server during requests processing. An autoencoder is implemented for dynamic response anomaly recognition. A case study with the MyBB web server is described. Several flood attacks and SQL injection attack are modeled and successfully detected by the proposed method. The efficiency of the detection algorithm is evaluated, and the adv...
Abstract — Study of the intrusion detection system. Current network System has large scale trouble f...
A novel approach is presented that bridges the gap between anomaly and misuse detection for identify...
Intrusion detection systems are used in an operational IT environment to strengthen the security. Ev...
Web-based vulnerabilities represent a substantial portion of the security exposures of computer netw...
Numerous techniques have been developed in order to prevent attacks on web servers. Anomaly detectio...
The universal use of the Internet has made it more difficult to achieve high security. Attackers tar...
Graduation date: 2008Web applications are popular attack targets. Misuse detection systems use signa...
Unlike signature or misuse based intrusion detection techniques, anomaly detection is capable of det...
Network servers are vulnerable to attack, and this state of affairs shows no sign of abating. Theref...
The syntax of application layer protocols carries valuable information for network intrusion detecti...
Web-Delivered services and applications have increased in both popularity and complexity over the pa...
Cybercriminals exploit vulnerabilities in web applications by leveraging different attacks to gain u...
The ubiquity of web applications has led to an increased focus on the development of attacks targeti...
Web applications are vulnerable to a variety of new security threats. SQL Injection Attacks (SQLIAs)...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
Abstract — Study of the intrusion detection system. Current network System has large scale trouble f...
A novel approach is presented that bridges the gap between anomaly and misuse detection for identify...
Intrusion detection systems are used in an operational IT environment to strengthen the security. Ev...
Web-based vulnerabilities represent a substantial portion of the security exposures of computer netw...
Numerous techniques have been developed in order to prevent attacks on web servers. Anomaly detectio...
The universal use of the Internet has made it more difficult to achieve high security. Attackers tar...
Graduation date: 2008Web applications are popular attack targets. Misuse detection systems use signa...
Unlike signature or misuse based intrusion detection techniques, anomaly detection is capable of det...
Network servers are vulnerable to attack, and this state of affairs shows no sign of abating. Theref...
The syntax of application layer protocols carries valuable information for network intrusion detecti...
Web-Delivered services and applications have increased in both popularity and complexity over the pa...
Cybercriminals exploit vulnerabilities in web applications by leveraging different attacks to gain u...
The ubiquity of web applications has led to an increased focus on the development of attacks targeti...
Web applications are vulnerable to a variety of new security threats. SQL Injection Attacks (SQLIAs)...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
Abstract — Study of the intrusion detection system. Current network System has large scale trouble f...
A novel approach is presented that bridges the gap between anomaly and misuse detection for identify...
Intrusion detection systems are used in an operational IT environment to strengthen the security. Ev...