2015 5th International Conference on IT Convergence and Security (ICITCS) 2015
DOI: 10.1109/icitcs.2015.7293028
|View full text |Cite
|
Sign up to set email alerts
|

Towards Improving Web Attack Detection: Highlighting the Significant Factors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…is layer will force each request to comply with the HTTP/1.x standard to fulfill the requirement of protection for HTTP request smuggling. e design principle hinges on whenever each request containing malicious content is found, the socket will be immediately closed and not forwarded to the web server [11][12][13][14][15][16][17][18].…”
Section: Related Workmentioning
confidence: 99%
“…is layer will force each request to comply with the HTTP/1.x standard to fulfill the requirement of protection for HTTP request smuggling. e design principle hinges on whenever each request containing malicious content is found, the socket will be immediately closed and not forwarded to the web server [11][12][13][14][15][16][17][18].…”
Section: Related Workmentioning
confidence: 99%