2015
DOI: 10.1016/j.cose.2015.09.007
|View full text |Cite
|
Sign up to set email alerts
|

Automatic generation of HTTP intrusion signatures by selective identification of anomalies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 36 publications
0
9
0
1
Order By: Relevance
“…There has been research on how to automatically feed-in a NIDS with signatures and thus to avoid manual work in this regard. To this end authors in Garcia-Teodoro and et al (2015) have shown a hybrid anomaly and signature based IDSs using the former to feed the new signatures to the latter. A comprehensive list of tools currently being used for attack detection and signature generation is given in Kaur and Singh (2013).…”
Section: Related Workmentioning
confidence: 99%
“…There has been research on how to automatically feed-in a NIDS with signatures and thus to avoid manual work in this regard. To this end authors in Garcia-Teodoro and et al (2015) have shown a hybrid anomaly and signature based IDSs using the former to feed the new signatures to the latter. A comprehensive list of tools currently being used for attack detection and signature generation is given in Kaur and Singh (2013).…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, solutions for generating rules are often limited to a certain type of software or a specific protocol. For instance, Nivethan and Papa (Nivethan & Papa, 2016) identified rules for SCADA-software, Nadler et al (2019)) focus on rules for the DNS protocol , and Garcia-Teodoro et al (2015) generate rules for the HTTP protocol. These proposals occasionally make use of knowledge related to the software and identify events that would be potential threats.…”
Section: Variables Related Of Software and Protocolmentioning
confidence: 99%
“…Within the first category of IDSs for web applications, most research focuses on monitoring the HTTP packets and methods to infer the web-based attacks over payload of network traffic [11]- [14] and [15]. The payload request and response are part of web application behaviors, hence there are relationships between its features.…”
Section: Related Workmentioning
confidence: 99%