[go: up one dir, main page]

Agarwal et al., 2018 - Google Patents

A closer look at intrusion detection system for web applications

Agarwal et al., 2018

View PDF @Full View
Document ID
10057856212708901902
Author
Agarwal N
Hussain S
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the web. IDS is a known methodology for detecting network‐based attacks but is still immature in monitoring and identifying web‐based application attacks. The objective of this research …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2465Aspects related to the EAS system, e.g. system components other than tags
    • G08B13/248EAS system combined with another detection technology, e.g. dual EAS and video or other presence detection system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details

Similar Documents

Publication Publication Date Title
Agarwal et al. A closer look at intrusion detection system for web applications
Mallick et al. Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments
Singh et al. A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions
Cazorla et al. Cyber stealth attacks in critical information infrastructures
US7934253B2 (en) System and method of securing web applications across an enterprise
US20090100518A1 (en) System and method for detecting security defects in applications
US20080047009A1 (en) System and method of securing networks against applications threats
US20080034424A1 (en) System and method of preventing web applications threats
Fung et al. Intrusion detection networks: a key to collaborative security
Möller Threats and threat intelligence
WO2008011576A2 (en) System and method of securing web applications across an enterprise
Siddiqui et al. Survey on unified threat management (UTM) systems for home networks
Mohammed et al. Automatic defense against zero-day polymorphic worms in communication networks
Banoth et al. Implementation and mitigation for cyber attacks with proposed OCR process model.
Jagannath et al. Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures
Badhwar The Case for AI/ML in Cybersecurity
Adiwal et al. Intrusion detection and prevention in openstack: A case study on enhancing security and threat detection
Panda et al. Intrusion prevention system
Veena et al. Implementing file and real time based intrusion detections in secure direct method using advanced honeypot
Zafar et al. Network security: a survey of modern approaches
Buchanan Introduction to security and network forensics
Lingamgunta Cyber Security For Beginners
Jogdand et al. Survey of different IDS using honeytoken based techniques to mitigate cyber threats
Masoodi Intrusion Detection in the Age of Deep Learning: An Introduction
US12483573B2 (en) Detecting scanning and attacking uniform resource locators in network traffic