TITLE

WEB ATAKLARI İÇİN METİN TABANLI ANORMALLİK TESPİTİ (WAMTAT)

AUTHOR(S)
Takci, Hidayet; Akyuz, Turker; Sogukpinar, İbrahim
PUB. DATE
June 2007
SOURCE
Journal of the Faculty of Engineering & Architecture of Gazi Uni;Jun2007, Vol. 22 Issue 2, p247
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Nowadays, there is an interaction between the web sites and users. In this interaction, user requests are sent to web servers in URL strings. Sometimes, harmful code may be embedded into those strings. Harmful code embedding is one of web attacks. User input data may be analyzed for detection of this type of attack. In this study, a text based anomaly detection method has been proposed. Proposed method uses textual properties of input data for analysis. This method that is implemented and given experimental results is particularly a new approach for web based anomaly detection.
ACCESSION #
26639371

 

Related Articles

  • Image map.  // Essential Internet;2003, p101 

    A definition of the term "image map" is presented. It refers to a clickable image used to help users navigate around and between web sites. It is divided into several different hotspot areas, each of which is linked to another destination. The clicking of the desired hotpots will take the user...

  • LETTER FROM THE EDITOR. Painter, Jamie // Back Stage (1946-5440);4/23/2009, Vol. 50 Issue 17, p5 

    In this article, the author offers information on the journal's newly designed website, www.BackStage.com. He says that the website features improved navigation and functionality and allows one to more easily locate stories, reviews, and blogs. He mentions that an online calendar of events for...

  • A Design and Implementation Model for Web Caching Using Server "URL Rewriting". Saleh, Mostafa E.; Nabi, A. Abdel; Mohamed, A. Baith // World Academy of Science, Engineering & Technology;Dec2009, Issue 36, p303 

    In order to make surfing the internet faster, and to save redundant processing load with each request for the same web page, many caching techniques have been developed to reduce latency of retrieving data on World Wide Web. In this paper we will give a quick overview of existing web caching...

  • Get those festival tickets. Munro, Ken // SC Magazine: For IT Security Professionals (UK Edition);Jul2007, p19 

    The author suggests the use of a payment web server to purchase tickets for a live music or sporting event on the day they are released. The payment web server is typically at another uniform resource locator (URL) that is far less heavily loaded unlike an event website, which becomes overly...

  • DDIonline.com launches!  // Display & Design Ideas;Jun2010, Vol. 22 Issue 4, p11 

    The article reports that "DDI Magazine," has launched a new uniform resource locator (URL) www. ddionline.com for its website.

  • CORRECTIONS.  // Crain's New York Business;1/2/2012, Vol. 28 Issue 1, p0003 

    A correction to the article "New York, New York" in the December 12, 2011 issue is presented which discusses NewYears.com's marketing of local venue tickets for the New Year's Eve.

  • my current favourites.  // New Media Age;12/17/2009, p33 

    The article reviews several web sites, including modernista.com, yourworldoftext.com, and mrdoob.com.

  • Tip. Gates, James // Learning & Leading with Technology;May2011, Vol. 38 Issue 7, p34 

    The article offers the author's insights on the use of Google web site http://docs.google.com/demo, that give users temporary universal resource locator (URL) to a document for use of teachers in their brainstorming sessions.

  • Detecting anomalous Web server usage through mining access logs. Gržinić, Toni; Kišasondi, Tonimir; Šaban, Josip // Central European Conference on Information & Intelligent Systems;Sep2013, p228 

    Most operating systems services generate log files that can be used for debugging and supervision. One important function of log files is logging security related or debug information, for example logging unsuccessful authentication or error logging. This paper shows how to implement an anomaly...

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics