2012
DOI: 10.1002/sec.613
|View full text |Cite
|
Sign up to set email alerts
|

Semantic aware attribution analysis of remote exploits

Abstract: Web services have been greatly threatened by remote exploit code attacks, where maliciously crafted HTTP requests are used to inject binary code to compromise web servers and web applications. In practice, besides detection of such attacks, attack attribution analysis (i.e., to automatically categorize exploits or determine whether an exploit is a variant of an attack from the past) is also very important. In this paper, we present SA3, a novel exploit code attribution analysis that combines semantics‐based an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…The NP-ROC lower curves have been successfully applied in a comparison of similarity measures for gene expression samples, where the prioritized type of error is mispredicting dissimilar samples as similar, because the samples, if predicted similar, will be used for further biological interpretation (40). Other potential applications include biomedical applications such as disease diagnosis (18,19), engineering applications such as network security control (20,21), financial applications such as loan screening (30) and financial data forecasting (41)(42)(43)(44), and social applications such as prediction of regional and international conflicts (23)(24)(25).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The NP-ROC lower curves have been successfully applied in a comparison of similarity measures for gene expression samples, where the prioritized type of error is mispredicting dissimilar samples as similar, because the samples, if predicted similar, will be used for further biological interpretation (40). Other potential applications include biomedical applications such as disease diagnosis (18,19), engineering applications such as network security control (20,21), financial applications such as loan screening (30) and financial data forecasting (41)(42)(43)(44), and social applications such as prediction of regional and international conflicts (23)(24)(25).…”
Section: Discussionmentioning
confidence: 99%
“…In many biomedical, engineering, and social applications, users often have prespecified a values to reflect their tolerance on the type I errors and use diverse classification algorithms. Example applications include diagnosis of coronary artery disease (18), cancer early warning system (19), network security control (20,21), Environmental Protection Agency water security research (22), prediction of regional and international conflicts (23,24), and the Early Warning Project to identify countries at risk of new mass atrocities (25). However, existing ad hoc use of classification algorithms cannot control type I errors under a with high probability.…”
Section: Introductionmentioning
confidence: 99%
“…Kong et al [15] have developed a semantic-aware analysis, the semantic aware inspection is having the ability to detect code manipulation such as renaming the processor registers or instruction reordering-all common obfuscation techniques. However, the disadvantage is that this tool can only identify a limited set of obfuscation tricks (i.e.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Although the scheme is focused on the detection of malware, it can be extended for attribution by incorporating behavioral analysis of attackers. Some researchers have also exploited the use of semantics and statistical modeling to establish attribution . Genetic algorithms …”
Section: Survey Of Attribution Techniquesmentioning
confidence: 99%