Anomaly detection of web-based attacks

C Kruegel, G Vigna - Proceedings of the 10th ACM conference on …, 2003 - dl.acm.org
Web-based vulnerabilities represent a substantial portion of the security exposures of
computer networks. In order to detect known web-based attacks, misuse detection systems …

A learning-based approach to the detection of SQL attacks

F Valeur, D Mutz, G Vigna - Detection of Intrusions and Malware, and …, 2005 - Springer
Web-based systems are often a composition of infrastructure components, such as web
servers and databases, and of application-specific code, such as HTML-embedded scripts …

A multi-model approach to the detection of web-based attacks

C Kruegel, G Vigna, W Robertson - Computer Networks, 2005 - Elsevier
Web-based vulnerabilities represent a substantial portion of the security exposures of
computer networks. In order to detect known web-based attacks, misuse detection systems …

[책][B] Intrusion detection and correlation: challenges and solutions

C Kruegel, F Valeur, G Vigna - 2004 - books.google.com
Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection
systems (IDSs) and addresses the problem of managing and correlating the alerts produced …

[PDF][PDF] Using generalization and characterization techniques in the anomaly-based detection of web attacks

W Robertson, G Vigna, C Kruegel, RA Kemmerer - NDSS, 2006 - seclab.nu
The custom, ad hoc nature of web applications makes learning-based anomaly detection
systems a suitable approach to provide early warning about the exploitation of novel …

A stateful intrusion detection system for world-wide web servers

G Vigna, W Robertson, V Kher… - 19th Annual Computer …, 2003 - ieeexplore.ieee.org
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition,
custom Web-based applications may introduce vulnerabilities that are overlooked even by …

Integrated access control and intrusion detection for web servers

T Ryutov, C Neuman, K Dongho… - IEEE transactions on …, 2003 - ieeexplore.ieee.org
Current intrusion detection systems work in isolation from access control for the application
the systems aim to protect. The lack of coordination and interoperation between these …

Zeek-osquery: Host-network correlation for advanced monitoring and intrusion detection

S Haas, R Sommer, M Fischer - … Conference on ICT Systems Security and …, 2020 - Springer
Abstract Intrusion Detection Systems (IDSs) can analyze network traffic for signs of attacks
and intrusions. However, encrypted communication limits their visibility and sophisticated …

[PDF][PDF] Using root cause analysis to handle intrusion detection alarms

K Julisch - 2003 - core.ac.uk
Klaus Julisch IBM Zurich Research Laboratory Säumerstrasse 4 8803 Rüschlikon,
Switzerland e-mail: kju@ zurich. ibm. com In response to attacks against enterprise …

Enhancing the accuracy of network-based intrusion detection with host-based context

H Dreger, C Kreibich, V Paxson, R Sommer - International Conference on …, 2005 - Springer
In the recent past, both network-and host-based approaches to intrusion detection have
received much attention in the network security community. No approach, taken exclusively …