SQL injection attack detection using fingerprints and pattern matching technique
暂无分享,去创建一个
[1] Lukas Kencl,et al. Approximate fingerprinting to accelerate pattern matching , 2006, IMC '06.
[2] George Varghese,et al. Applying Fast String Matching to Intrusion Detection , 2001 .
[3] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[4] Debabrata Kar,et al. SQLiDDS: SQL Injection Detection Using Query Transformation and Document Similarity , 2015, ICDCIT.
[5] Wang Yi,et al. Literal Tainting Method for Preventing Code Injection Attack in Web Application , 2012 .
[6] Marc Najork,et al. On the evolution of clusters of near-duplicate Web pages , 2003, Proceedings of the IEEE/LEOS 3rd International Conference on Numerical Simulation of Semiconductor Optoelectronic Devices (IEEE Cat. No.03EX726).
[7] Sharath Pankanti,et al. On the Individuality of Fingerprints , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[8] Zhendong Su,et al. Sound and precise analysis of web applications for injection vulnerabilities , 2007, PLDI '07.
[9] Christopher Krügel,et al. Static analysis for detecting taint-style vulnerabilities in web applications , 2010, J. Comput. Secur..
[10] Bruce W. Weide,et al. Using parse tree validation to prevent SQL injection attacks , 2005, SEM '05.
[11] Stuart Staniford,et al. Towards Faster String Matching for Intrusion Detection , 2001 .
[12] Zeng Qing. Taint Propagation Analysis and Dynamic Verification with Information Flow Policy , 2011 .
[13] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.
[14] C.J. Coit,et al. Towards faster string matching for intrusion detection or exceeding the speed of Snort , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[15] Robert S. Boyer,et al. A fast string searching algorithm , 1977, CACM.
[16] Zhoujun Li,et al. SQL Injection Detection via Program Tracing and Machine Learning , 2012, IDCS.