Sciweavers

172 search results - page 4 / 35
» Anomaly detection of web-based attacks
Sort
View
JNCA
2007
136views more  JNCA 2007»
13 years 7 months ago
Adaptive anomaly detection with evolving connectionist systems
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
Yihua Liao, V. Rao Vemuri, Alejandro Pasos
INFOCOM
2010
IEEE
13 years 6 months ago
URCA: Pulling out Anomalies by their Root Causes
—Traffic anomaly detection has received a lot of attention over recent years, but understanding the nature of these anomalies and identifying the flows involved is still a manu...
Fernando Silveira, Christophe Diot
ISM
2008
IEEE
104views Multimedia» more  ISM 2008»
14 years 1 months ago
Provision of Quality of Service with Router Support
The current Internet servers are susceptible to network attacks. The DDoS attacks consume the network bandwidth and degrade the services provided by the servers. This paper propos...
Hongli Luo, Mei-Ling Shyu
IEEEARES
2008
IEEE
14 years 1 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
ISMIS
2005
Springer
14 years 1 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...