A Learning-Based Approach to the Detection of SQL Attacks
- 1 January 2005
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 123-140
- https://doi.org/10.1007/11506881_8
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Simulating realistic network worm traffic for worm warning system design and testingPublished by Association for Computing Machinery (ACM) ,2003
- Anomaly detection of web-based attacksPublished by Association for Computing Machinery (ACM) ,2003
- On the Detection of Anomalous System Call ArgumentsLecture Notes in Computer Science, 2003
- A sense of self for Unix processesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Undermining an Anomaly-Based Intrusion Detection System Using Common ExploitsLecture Notes in Computer Science, 2002
- Learning Fingerprints for a Database Intrusion Detection SystemLecture Notes in Computer Science, 2002
- Learning nonstationary models of normal network traffic for detecting novel attacksPublished by Association for Computing Machinery (ACM) ,2002
- Application-Integrated Data Collection for Security MonitoringLecture Notes in Computer Science, 2001
- Inducing probabilistic grammars by Bayesian model mergingLecture Notes in Computer Science, 1994
- An Intrusion-Detection ModelIEEE Transactions on Software Engineering, 1987