Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement

MH Chung, Y Yang, L Wang, G Cento, K Jerath… - ACM Computing …, 2023 - dl.acm.org
In this article we consider the problem of defending against increasing data exfiltration
threats in the domain of cybersecurity. We review existing work on exfiltration threats and …

Web application firewall: Network security models and configuration

V Clincy, H Shahriar - 2018 IEEE 42nd Annual Computer …, 2018 - ieeexplore.ieee.org
Web Application Firewalls (WAFs) are deployed to protect web applications and they offer in
depth security as long as they are configured correctly. A problem arises when there is over …

Web attack detection using deep learning models

JIC Eunaicy, S Suguna - Materials Today: Proceedings, 2022 - Elsevier
Due to the network access and security vulnerabilities of web applications, web applications
are often targets of cyber-attacks. Attacks against web applications can be extremely …

Web application attack detection and forensics: A survey

M Babiker, E Karaarslan… - 2018 6th international …, 2018 - ieeexplore.ieee.org
Web application attacks are an increasingly important area in information security and digital
forensics. It has been observed that attackers are developing the capability to bypass …

A novel method of honeypot inclusive WAF to protect from SQL injection and XSS

S Rahul, CS Vajrala… - … Conference on Disruptive …, 2021 - ieeexplore.ieee.org
In todays world, there are billions of applications on the internet holding a lot of user data
which automatically increases the threat of being attacked by hackers. Often User privacy …

Implementation of blockchain based distributed web attack detection application

M Tanrıverdi, A Tekerek - 2019 1st International Informatics and …, 2019 - ieeexplore.ieee.org
In last decades' web application security has become one of the most important case study
of information security studies. Business processes are transferred to web platforms. So web …

The multi-demeanor fusion based robust intrusion detection system for anomaly and misuse detection in computer networks

AR Gupta, J Agrawal - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Combating the cyber threats, particularly attack detection, is a challenging area of the
intrusion detection system (IDS). Exceptional development and internet usage raise …

Research and implementation of WEB application firewall based on feature matching

H Yuan, L Zheng, L Dong, X Peng, Y Zhuang… - Application of Intelligent …, 2019 - Springer
The rapid development of the Internet has brought great convenience to our lives.
Correspondingly, the rapid development of the web relies on the continuous development of …

Flexible bus and NoC performance analysis with configurable synthetic workloads

R Thid, I Sander, A Jantsch - 9th EUROMICRO Conference on …, 2006 - ieeexplore.ieee.org
We present a flexible method for bus and network on chip performance analysis, which is
based on the adaptation of workload models to resemble various applications. Our analysis …

A structured analysis of sql injection runtime mitigation techniques

S Steiner, D Conte de Leon, J Alves-Foss - 2017 - scholarspace.manoa.hawaii.edu
SQL injection attacks (SQLIA) still remain one of the most commonly occurring and exploited
vulnerabilities. A considerable amount of research concerning SQLIA mitigation techniques …