Please use this identifier to cite or link to this item: https://doi.org/10.1109/ARES.2008.127
DC FieldValue
dc.titleDefending on-line web application security with user-behavior surveillance
dc.contributor.authorCheng Y.-C.
dc.contributor.authorLaih C.-S.
dc.contributor.authorLai G.-H.
dc.contributor.authorChen C.-M.
dc.contributor.authorChen T.
dc.date.accessioned2018-08-21T05:05:41Z
dc.date.available2018-08-21T05:05:41Z
dc.date.issued2008
dc.identifier.citationCheng Y.-C., Laih C.-S., Lai G.-H., Chen C.-M., Chen T. (2008). Defending on-line web application security with user-behavior surveillance. ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings : 410-415. ScholarBank@NUS Repository. https://doi.org/10.1109/ARES.2008.127
dc.identifier.isbn0769531024
dc.identifier.isbn9780769531021
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/146242
dc.description.abstractWith the incoming of information era, web-based service has been developed rapidly and offered more and more business. These "open", and widely "web enabled" applications are subject to greater and greater levels and types of attacks as hackers exploit vulnerabilities within the software like SQL Injection and Cross Site Scripts (XSS) attack. In this paper, we proposed a type of novel Embedded Markov Model (EMM) to detect different web application attacks, monitor the on-line user behavior and defend the malevolent user promptly. Comparing to previous web application attacks detecting approaches, our EMM approach can not only detect user's invalidated input errors but also find out the unreasonable page transition behavior. By detecting unreasonable page transition, we can immediately defend the malevolent or silly user behavior to avoid the further web system failures and sensitive information disclosure. Furthermore, we implement an on-line user behavior surveillance system and use the real web traffic to evaluate the performance of our system. The experiment results show that our proposed EMM method can discover the abnormal behavior of malevolent user and detect the invalidated input attacks like SQL injection, XSS and string buffer overflow attacks.
dc.sourceScopus
dc.subjectMarkov model
dc.subjectUser behavior
dc.subjectWeb application security
dc.subjectWeb attacks
dc.subjectWeb security
dc.typeConference Paper
dc.contributor.departmentOFFICE OF THE PROVOST
dc.contributor.departmentDEPARTMENT OF COMPUTER SCIENCE
dc.description.doi10.1109/ARES.2008.127
dc.description.sourcetitleARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings
dc.description.page410-415
dc.published.statepublished
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.