A closer look at intrusion detection system for web applications

N Agarwal, SZ Hussain - Security and Communication …, 2018 - Wiley Online Library
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the
web. IDS is a known methodology for detecting network‐based attacks but is still immature …

Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications

A Razzaq, A Hur, HF Ahmad… - 2013 IEEE Eleventh …, 2013 - ieeexplore.ieee.org
Cyber Civilization has become an important source of information sharing and professional
activities like business, banking transactions, shopping, services and advertisement. With …

Reversible sketches for efficient and accurate change detection over network data streams

R Schweller, A Gupta, E Parsons, Y Chen - Proceedings of the 4th ACM …, 2004 - dl.acm.org
Traffic anomalies such as failures and attacks are increasing in frequency and severity, and
thus identifying them rapidly and accurately is critical for large network operators. The …

A POMDP approach to the dynamic defense of large-scale cyber networks

E Miehling, M Rasouli… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
We investigate the problem of optimally mitigating the progression of an adversary through a
network in real-time, decreasing the probability of it reaching its goal (s), while minimizing …

Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications

W Xiong, H Hu, N Xiong, LT Yang, WC Peng… - Information …, 2014 - Elsevier
Cloud computing represents a new paradigm where computing resources are offered as
services in the world via communication Internet. As many new types of attacks are arising at …

Semantic security against web application attacks

A Razzaq, K Latif, HF Ahmad, A Hur, Z Anwar… - Information …, 2014 - Elsevier
In this paper, we propose a method of detecting and classifying web application attacks. In
contrast to current signature-based security methods, our solution is an ontology based …

Access authorization having embedded policies

G Golan, M Vayman - US Patent 8,181,219, 2012 - Google Patents
(57) ABSTRACT A facility for receiving an embedded policy is provided. The facility checks
an application program image for the presence of an embedded policy. If an embedded …

Adaptive trust negotiation and access control

T Ryutov, L Zhou, C Neuman, T Leithead… - Proceedings of the …, 2005 - dl.acm.org
Electronic transactions regularly occur between business partners in separate security
domains. Trust negotiation is an approach that provides an open authentication and access …

Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques

U Upadhyay, A Kumar, G Sharma, AK Saini… - International Journal of …, 2024 - igi-global.com
The advent of the metaverse has revolutionized virtual interactions and navigation,
introducing intricate access control challenges. This paper addresses the need for effective …

[HTML][HTML] irs-partition: An Intrusion Response System utilizing Deep Q-Networks and system partitions

V Cardellini, E Casalicchio, S Iannucci, M Lucantonio… - SoftwareX, 2022 - Elsevier
Intrusion Response is a relatively new field of research. Recent approaches for the creation
of Intrusion Response Systems (IRSs) use Reinforcement Learning (RL) as a primary …