2019
DOI: 10.1007/978-3-030-35869-3_10
|View full text |Cite
|
Sign up to set email alerts
|

Automated Classification of Web-Application Attacks for Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Nonetheless, there are numerous training challenges like networking, web, cryptography, defensive cyber security etc., where we can extend the support for hybrid scoring. Harsh et al [2] mentioned that using server logs, one can identify participant's behaviour. Web request can be classified into attacks such as SQL Injection, Cross-Site Scripting, Path-traversal, Command Injection, Cross-site request forgery etc.…”
Section: Discussionmentioning
confidence: 99%
“…Nonetheless, there are numerous training challenges like networking, web, cryptography, defensive cyber security etc., where we can extend the support for hybrid scoring. Harsh et al [2] mentioned that using server logs, one can identify participant's behaviour. Web request can be classified into attacks such as SQL Injection, Cross-Site Scripting, Path-traversal, Command Injection, Cross-site request forgery etc.…”
Section: Discussionmentioning
confidence: 99%
“…We modified the IDS developed by Bhagwani Et Al. [6] to predict SQLi, XSS, and OSC attacks on HTTP servers. The SOAR Engine uses these machine learning models to detect attacks in the logs of the initial HTTP honeypot deployed and then deploy HTTP honeypots in other IPs with specific vulnerabilities like SQLi, XSS, and OSC.…”
Section: ) Http Ids Botnet and Ddos Detectionmentioning
confidence: 99%