Dabbour et al., 2013 - Google Patents
Efficient assessment and evaluation for websites vulnerabilities using SNORTDabbour et al., 2013
View PDF- Document ID
- 3205860318767796804
- Author
- Dabbour M
- Alsmadi I
- Alsukhni E
- Publication year
External Links
Snippet
An endless number of methods or ways exists to access illegally a web server or a website. The task of defending a system (eg network, server, website, etc.) is complex and challenging. SNORT is one of the popular open source tools that can be used to detect and …
- 238000011156 evaluation 0 title description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhang et al. | Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing | |
| Alshamrani et al. | A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities | |
| Han et al. | Deception techniques in computer security: A research perspective | |
| Song et al. | Advanced evasion attacks and mitigations on practical ML‐based phishing website classifiers | |
| US9501639B2 (en) | Methods, systems, and media for baiting inside attackers | |
| Prokhorenko et al. | Web application protection techniques: A taxonomy | |
| Kirda et al. | Client-side cross-site scripting protection | |
| Kartaltepe et al. | Social network-based botnet command-and-control: emerging threats and countermeasures | |
| Wang et al. | Automatically Traceback RDP‐Based Targeted Ransomware Attacks | |
| US20120084866A1 (en) | Methods, systems, and media for measuring computer security | |
| Dabbour et al. | Efficient assessment and evaluation for websites vulnerabilities using SNORT | |
| Wang et al. | RansomTracer: exploiting cyber deception for ransomware tracing | |
| Rodríguez-Galán et al. | Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing | |
| Kshetri et al. | algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms | |
| Chaudhary et al. | Plague of cross-site scripting on web applications: a review, taxonomy and challenges | |
| Sundareswaran et al. | XSS-Dec: A hybrid solution to mitigate cross-site scripting attacks | |
| Raman | JaSPIn: JavaScript based Anomaly Detection of Cross-site scripting attacks | |
| Shahriar et al. | Towards an attack signature generation framework for intrusion detection systems | |
| Izagirre | Deception strategies for web application security: application-layer approaches and a testing platform | |
| Sanjana et al. | A study on cross site scripting attacks | |
| Çelik et al. | Detection of trickbot and emotet banking trojans with machine learning | |
| Kaushik et al. | SQL injection attack detection and prevention methods: a critical review | |
| Abufardeh et al. | The State of Phishing Attacks and Countermeasures | |
| Mourtaji et al. | New hybrid framework to detect phishing web pages, based on rules and variant selection of features | |
| US20240154997A1 (en) | Tor-based malware detection |