Patterns Extraction Method for Anomaly Detection in HTTP Traffic
暂无分享,去创建一个
[1] PageKicker Robot Phil. OWASP Top 10: The Top 10 Most Critical Web Application Security Threats Enhanced with Text Analytics and Content by PageKicker Robot Phil 73 , 2014 .
[2] Michał Choraś,et al. Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection , 2014 .
[3] Alessandro Orso,et al. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.
[4] Fang Yu,et al. Stranger: An Automata-Based String Analysis Tool for PHP , 2010, TACAS.
[5] Michal Choras,et al. Evaluation of Various Techniques for SQL Injection Attack Detection , 2013, CORES.
[6] Lwin Khin Shar,et al. Predicting common web application vulnerabilities from input validation and sanitization code patterns , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[7] Christopher Krügel,et al. Service specific anomaly detection for network intrusion detection , 2002, SAC '02.
[8] Abraham Lempel,et al. A universal algorithm for sequential data compression , 1977, IEEE Trans. Inf. Theory.
[9] Michal Choras,et al. Correlation Approach for SQL Injection Attacks Detection , 2012, CISIS/ICEUTE/SOCO Special Sessions.
[10] Terry A. Welch,et al. A Technique for High-Performance Data Compression , 1984, Computer.