Agarwal et al., 2018 - Google Patents
A closer look at intrusion detection system for web applicationsAgarwal et al., 2018
View PDF- Document ID
- 10057856212708901902
- Author
- Agarwal N
- Hussain S
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the web. IDS is a known methodology for detecting network‐based attacks but is still immature in monitoring and identifying web‐based application attacks. The objective of this research …
- 238000001514 detection method 0 title abstract description 184
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2465—Aspects related to the EAS system, e.g. system components other than tags
- G08B13/248—EAS system combined with another detection technology, e.g. dual EAS and video or other presence detection system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2428—Tag details
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Agarwal et al. | A closer look at intrusion detection system for web applications | |
| Mallick et al. | Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments | |
| Singh et al. | A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions | |
| Cazorla et al. | Cyber stealth attacks in critical information infrastructures | |
| US7934253B2 (en) | System and method of securing web applications across an enterprise | |
| US20090100518A1 (en) | System and method for detecting security defects in applications | |
| US20080047009A1 (en) | System and method of securing networks against applications threats | |
| US20080034424A1 (en) | System and method of preventing web applications threats | |
| Fung et al. | Intrusion detection networks: a key to collaborative security | |
| Möller | Threats and threat intelligence | |
| WO2008011576A2 (en) | System and method of securing web applications across an enterprise | |
| Siddiqui et al. | Survey on unified threat management (UTM) systems for home networks | |
| Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
| Banoth et al. | Implementation and mitigation for cyber attacks with proposed OCR process model. | |
| Jagannath et al. | Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures | |
| Badhwar | The Case for AI/ML in Cybersecurity | |
| Adiwal et al. | Intrusion detection and prevention in openstack: A case study on enhancing security and threat detection | |
| Panda et al. | Intrusion prevention system | |
| Veena et al. | Implementing file and real time based intrusion detections in secure direct method using advanced honeypot | |
| Zafar et al. | Network security: a survey of modern approaches | |
| Buchanan | Introduction to security and network forensics | |
| Lingamgunta | Cyber Security For Beginners | |
| Jogdand et al. | Survey of different IDS using honeytoken based techniques to mitigate cyber threats | |
| Masoodi | Intrusion Detection in the Age of Deep Learning: An Introduction | |
| US12483573B2 (en) | Detecting scanning and attacking uniform resource locators in network traffic |