2010
DOI: 10.5121/ijnsa.2010.2313
|View full text |Cite
|
Sign up to set email alerts
|

Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…Authors in [13] In [14], a more interactive approach to detecting and predicting anomaly based on IDS was proposed. This approach takes a metric described as F-score per Cost (FPC) for each attack predictor into consideration.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Authors in [13] In [14], a more interactive approach to detecting and predicting anomaly based on IDS was proposed. This approach takes a metric described as F-score per Cost (FPC) for each attack predictor into consideration.…”
Section: Related Workmentioning
confidence: 99%
“…The Bayes Theorem as reported in [16] can be used to calculate the probabilities of the state of the system with respect to the reports given by the detector as shown in Equations (11)- (14). − + − (14) As shown in Table 1, the expected cost, which is dependent on the detector's report, is shown mathematically by finding the sum of the products of the probabilities together with the cost of the node following the response.…”
Section: Expected Costmentioning
confidence: 99%
“…Some example of such researches can be found in [6,7,8,9,10,11]. In summary, these researches have shown that given good detection and prevention techniques, it is possible to develop an integrated ID/IP system to defend the WS applications against SOAP/XML attacks.…”
Section: International Workhop On Cloud Computing and Information Sementioning
confidence: 99%
“…Signature based detection [6] [19] is nothing but pattern matching. This extracts the features from the IRC packet and performs the cross check with the existing IRC C&C signatures stored in the database.…”
Section: Signature Based Detectionmentioning
confidence: 99%