2009 IEEE Congress on Evolutionary Computation 2009
DOI: 10.1109/cec.2009.4983190
|View full text |Cite
|
Sign up to set email alerts
|

Detecting web application attacks with use of Gene Expression Programming

Abstract: In the paper we present a novel approach based on applying a modern metaheuristic Gene Expression Programming (GEP) to detecting web application attacks. This class of attacks relates to malicious activity of an intruder against applications, which use a database for storing data. The application uses SQL to retrieve data from the database and web server mechanisms to put them in a web browser. A poor implementation allows an attacker to modify SQL statements originally developed by a programmer, which leads t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…Above the defined 36 tokens can be a potential risk to the system. False positive results are also a possibility [9].…”
Section: Literature Surveymentioning
confidence: 99%
“…Above the defined 36 tokens can be a potential risk to the system. False positive results are also a possibility [9].…”
Section: Literature Surveymentioning
confidence: 99%
“…The existing solutions focus on web application attacks in general and are dependent on the applications [8] [9]. All the solutions are not placed as a layered approach and are specific to back-end databases and specific to platforms [10][11] [12]. This paper presents a different methodology to detect and protect SQL Injection in web applications through independent web services in a layered approach.…”
Section: Sql Injectionmentioning
confidence: 99%
“…For example, the greedy generation scheme is based on the r-continuous bit matching: when generating an initial detector, it searches for any detector that can match the initial one. If there exists the detector, it means that the initial detector is redundant and should be deleted [18]. Meanwhile, the variable-length method that generating variable-length detectors can solve the problem with "holes" caused by the r-continuous bit matching [20], and the detector set is optimized during the detector generation process to avoid the redundant detectors.…”
Section: Related Workmentioning
confidence: 99%
“…As being briefly mentioned earlier, in IIDS, a detector is the rule for recognizing attacks. The constraint-based GEP rule (here in after to be referred as GEP-rule), has been proposed in our previous work and been proved to be feasible and effective [18]. Let L be a logical operator set, R be a relational operator set, and A be an arithmetic operator set.…”
Section: Representation Of Artificial Immune Entities (1) Antigen Rep...mentioning
confidence: 99%
See 1 more Smart Citation