[go: up one dir, main page]

Tan et al., 2021 - Google Patents

Web application anomaly detection based on converting http request parameters to numeric

Tan et al., 2021

View PDF
Document ID
5570289783944760928
Author
Tan H
Van Hoai T
Publication year
Publication venue
2021 15th International Conference on Advanced Computing and Applications (ACOMP)

External Links

Snippet

Nowadays, the fast growth of cloud computing, IoT, and intelligent terminal leads to a shift from traditional software to web-based applications. Consequently, they are subject to being attacked by computer cybercriminals. In particular, a query string sent to web applications …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • G06F17/30799Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/68Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • G06K9/6284Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection

Similar Documents

Publication Publication Date Title
US20230012220A1 (en) Method for determining likely malicious behavior based on abnormal behavior pattern comparison
US11012472B2 (en) Security rule generation based on cognitive and industry analysis
Prasse et al. Malware detection by analysing network traffic with neural networks
Shibahara et al. Efficient dynamic malware analysis based on network behavior using deep learning
EP4312420A2 (en) A method for sharing cybersecurity threat analysis and defensive measures amongst a community
Nelms et al. {ExecScent}: Mining for new {C&C} domains in live networks with adaptive control protocol templates
Boukhtouta et al. Network malware classification comparison using DPI and flow packet headers
WO2022040698A1 (en) Malicious traffic detection with anomaly detection modeling
Rieck et al. Language models for detection of unknown attacks in network traffic
Wang et al. MAAC: Novel alert correlation method to detect multi-step attack
Lee et al. LARGen: automatic signature generation for Malwares using latent Dirichlet allocation
Kaur et al. Automatic attack signature generation systems: A review
Min An analysis of K-means algorithm based network intrusion detection system
Soleymani et al. A Novel Approach for Detecting DGA‐Based Botnets in DNS Queries Using Machine Learning Techniques
Kheir Behavioral classification and detection of malware through http user agent anomalies
Xu et al. [Retracted] DDoS Detection Using a Cloud‐Edge Collaboration Method Based on Entropy‐Measuring SOM and KD‐Tree in SDN
Othman et al. An intelligent intrusion detection system for internet of things attack detection and identification using machine learning
Zheng et al. Detecting malicious tls network traffic based on communication channel features
Chiou et al. Network security management with traffic pattern clustering
Kheir et al. Automated classification of C&C connections through malware URL clustering
Jing et al. DDoS detection based on graph structure features and non‐negative matrix factorization
Sidi et al. Helix: Dga domain embeddings for tracking and exploring botnets
Yan et al. A domain embedding model for botnet detection based on smart blockchain
Tan et al. Web application anomaly detection based on converting http request parameters to numeric
Xie et al. Application‐Layer DDoS Attack Detection Using Explicit Duration Recurrent Network‐Based Application‐Layer Protocol Communication Models