2008
DOI: 10.1016/j.cose.2008.06.002
|View full text |Cite
|
Sign up to set email alerts
|

Application-based anomaly intrusion detection with dynamic information flow analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
5
4
1

Relationship

5
5

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…In our experiments, we explore four of its documented vulnerabilities, exhibiting JSP source code disclosure (vulnerability 1), directory listing disclosure (vulnerability 2), and JSP engine denial of service (vulnerabilities 3 and 4). Details on these vulnerabilities could be found in [22]. The total test suite used for this application consists of 658 requests, 460 of which are safe, while the rest are unsafe, exploiting one of the four vulnerabilities.…”
Section: Preliminary Resultsmentioning
confidence: 99%
“…In our experiments, we explore four of its documented vulnerabilities, exhibiting JSP source code disclosure (vulnerability 1), directory listing disclosure (vulnerability 2), and JSP engine denial of service (vulnerabilities 3 and 4). Details on these vulnerabilities could be found in [22]. The total test suite used for this application consists of 658 requests, 460 of which are safe, while the rest are unsafe, exploiting one of the four vulnerabilities.…”
Section: Preliminary Resultsmentioning
confidence: 99%
“…Specifically, given test sets comprising passing and failing test cases, we measure the effectiveness of a given technique at isolating the failing test cases from the passing cases. The findings of this study are not only relevant to software testing [3] [4] [16] [12], but also to other software analyses that apply cluster analysis to execution profiles [11] [15] [16]. For example, Podgurski et al [18] applied cluster analysis and stratified sampling onto execution profiles to enhance the effectiveness of software reliability estimation.…”
Section: Introductionmentioning
confidence: 82%
“…We use dynamic detection methods to determine current states of the user [12]. For example: if the computer detects that a user leaves for some time, it will turns off the screen automatically to save power.…”
Section: System Architecture and Scenariosmentioning
confidence: 99%