Tan et al., 2021 - Google Patents
Web application anomaly detection based on converting http request parameters to numericTan et al., 2021
View PDF- Document ID
- 5570289783944760928
- Author
- Tan H
- Van Hoai T
- Publication year
- Publication venue
- 2021 15th International Conference on Advanced Computing and Applications (ACOMP)
External Links
Snippet
Nowadays, the fast growth of cloud computing, IoT, and intelligent terminal leads to a shift from traditional software to web-based applications. Consequently, they are subject to being attacked by computer cybercriminals. In particular, a query string sent to web applications …
- 238000001514 detection method 0 title abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/68—Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
- G06K9/6284—Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20230012220A1 (en) | Method for determining likely malicious behavior based on abnormal behavior pattern comparison | |
| US11012472B2 (en) | Security rule generation based on cognitive and industry analysis | |
| Prasse et al. | Malware detection by analysing network traffic with neural networks | |
| Shibahara et al. | Efficient dynamic malware analysis based on network behavior using deep learning | |
| EP4312420A2 (en) | A method for sharing cybersecurity threat analysis and defensive measures amongst a community | |
| Nelms et al. | {ExecScent}: Mining for new {C&C} domains in live networks with adaptive control protocol templates | |
| Boukhtouta et al. | Network malware classification comparison using DPI and flow packet headers | |
| WO2022040698A1 (en) | Malicious traffic detection with anomaly detection modeling | |
| Rieck et al. | Language models for detection of unknown attacks in network traffic | |
| Wang et al. | MAAC: Novel alert correlation method to detect multi-step attack | |
| Lee et al. | LARGen: automatic signature generation for Malwares using latent Dirichlet allocation | |
| Kaur et al. | Automatic attack signature generation systems: A review | |
| Min | An analysis of K-means algorithm based network intrusion detection system | |
| Soleymani et al. | A Novel Approach for Detecting DGA‐Based Botnets in DNS Queries Using Machine Learning Techniques | |
| Kheir | Behavioral classification and detection of malware through http user agent anomalies | |
| Xu et al. | [Retracted] DDoS Detection Using a Cloud‐Edge Collaboration Method Based on Entropy‐Measuring SOM and KD‐Tree in SDN | |
| Othman et al. | An intelligent intrusion detection system for internet of things attack detection and identification using machine learning | |
| Zheng et al. | Detecting malicious tls network traffic based on communication channel features | |
| Chiou et al. | Network security management with traffic pattern clustering | |
| Kheir et al. | Automated classification of C&C connections through malware URL clustering | |
| Jing et al. | DDoS detection based on graph structure features and non‐negative matrix factorization | |
| Sidi et al. | Helix: Dga domain embeddings for tracking and exploring botnets | |
| Yan et al. | A domain embedding model for botnet detection based on smart blockchain | |
| Tan et al. | Web application anomaly detection based on converting http request parameters to numeric | |
| Xie et al. | Application‐Layer DDoS Attack Detection Using Explicit Duration Recurrent Network‐Based Application‐Layer Protocol Communication Models |