Computer Science ›› 2013, Vol. 40 ›› Issue (Z6): 344-348.

Previous Articles     Next Articles

Use Combination of Detection Systems to Reduce Errors of Judgment on Malicious Request

LIN Jie   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Today’s Web application customization technology is widely used.Anomaly detection in early warning and real-time blocking the attack site of application-level program is a very suitable method.However,anomaly detection techniques are easier to detect problems of false positives and false negatives.The use of an integrated system can solve the problem.This integrated system includs the anomaly detection system based anomaly detection system,the Web and a database.Anomaly detection system and the SQL query of a Web serial structure of the anomaly detection system will be able to improve the efficiency of the detection system.The algorithm was evaluated for its applicability on several existing Web application.It is showed that the algorithm is feasible and effective to reduce false positives and false negatives.

Key words: Anomaly detection,SQL queries,Web applications

[1] Akritidis P,Anagnostakis K,Markatos E.Efficient content-based of zero-day worms[C]∥Proceedings of the International Conference on Communications (ICC).eoul,Korea,May 2005
[2] Andersson R.punnBBB-fast and lightweight PHP-powered discussion boardhttp://www.punbb.org,2005. (下转第380页)(上接第348页)
[3] Roesh M.Snort-lightweight intrusion detection for networks[C]∥Proceedings of the USENIX LISA’99Conference.Seattle,WA,November 1999
[4] Axelsson S.punBB-fast fallacy and its implications for the difficulty of intrusion detection[C]∥Proceedings of the 6tth ACM Conference on Computer and Computer and Communications Security.Singapore,1999
[5] Sidiroglou K A S,Akritidis P,Xinidis K,et al.Detecting targeted attacks using shadow honeypots[C]∥Proceeding of the USENIX Security Symposium Baltimore.MD,August 2005
[6] Common vulnerabilities and exposures.http://www.cve.mitre.org,2003
[7] Breache Security Breachgate.http://www.breach.com,2006-08
[8] Citrix.Citrix application firewall.http://www.citrix.com,2006-08

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!