[go: up one dir, main page]

Dabbour et al., 2013 - Google Patents

Efficient assessment and evaluation for websites vulnerabilities using SNORT

Dabbour et al., 2013

View PDF
Document ID
3205860318767796804
Author
Dabbour M
Alsmadi I
Alsukhni E
Publication year

External Links

Snippet

An endless number of methods or ways exists to access illegally a web server or a website. The task of defending a system (eg network, server, website, etc.) is complex and challenging. SNORT is one of the popular open source tools that can be used to detect and …
Continue reading at digitalcommons.tamusa.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Zhang et al. Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
Alshamrani et al. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
Han et al. Deception techniques in computer security: A research perspective
Song et al. Advanced evasion attacks and mitigations on practical ML‐based phishing website classifiers
US9501639B2 (en) Methods, systems, and media for baiting inside attackers
Prokhorenko et al. Web application protection techniques: A taxonomy
Kirda et al. Client-side cross-site scripting protection
Kartaltepe et al. Social network-based botnet command-and-control: emerging threats and countermeasures
Wang et al. Automatically Traceback RDP‐Based Targeted Ransomware Attacks
US20120084866A1 (en) Methods, systems, and media for measuring computer security
Dabbour et al. Efficient assessment and evaluation for websites vulnerabilities using SNORT
Wang et al. RansomTracer: exploiting cyber deception for ransomware tracing
Rodríguez-Galán et al. Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing
Kshetri et al. algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms
Chaudhary et al. Plague of cross-site scripting on web applications: a review, taxonomy and challenges
Sundareswaran et al. XSS-Dec: A hybrid solution to mitigate cross-site scripting attacks
Raman JaSPIn: JavaScript based Anomaly Detection of Cross-site scripting attacks
Shahriar et al. Towards an attack signature generation framework for intrusion detection systems
Izagirre Deception strategies for web application security: application-layer approaches and a testing platform
Sanjana et al. A study on cross site scripting attacks
Çelik et al. Detection of trickbot and emotet banking trojans with machine learning
Kaushik et al. SQL injection attack detection and prevention methods: a critical review
Abufardeh et al. The State of Phishing Attacks and Countermeasures
Mourtaji et al. New hybrid framework to detect phishing web pages, based on rules and variant selection of features
US20240154997A1 (en) Tor-based malware detection