19th Annual Computer Security Applications Conference, 2003. Proceedings.
DOI: 10.1109/csac.2003.1254308
|View full text |Cite
|
Sign up to set email alerts
|

A stateful intrusion detection system for world-wide web servers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 81 publications
(42 citation statements)
references
References 9 publications
0
42
0
Order By: Relevance
“…Software-based solutions like Bro [11], Snort [12], and WebSTAT [15] perform analysis of TCP flows, but are limited to processing data at rates less than 100Mbps. FPGA-based network processing systems can process network traffic at much higher data rates.…”
Section: Related Workmentioning
confidence: 99%
“…Software-based solutions like Bro [11], Snort [12], and WebSTAT [15] perform analysis of TCP flows, but are limited to processing data at rates less than 100Mbps. FPGA-based network processing systems can process network traffic at much higher data rates.…”
Section: Related Workmentioning
confidence: 99%
“…Traditionally, intrusion detection methods fall into two main categories according to their method of detection [1], [2]. These categories are signature-based detection (also known as knowledge-based detection or misuse detection) and anomaly-based detection (also known as behaviorbased detection).…”
Section: Introductionmentioning
confidence: 99%
“…a) E-mail: aozkaya@mevlana.edu.tr DOI: 10.1587/transinf.2015EDP7357 day) attacks. It analyzes the patterns of normal network and system activities, and classifies them as anomalous if they differ from normal patterns [1]. Because machine learning algorithms enable computer systems to learn in a manner similar to the way in which a human learns, they are typically used in anomaly-based IDS.…”
Section: Introductionmentioning
confidence: 99%
“…This set is composed of 71,596 HTTP requests. To check if this set contains only non-intrusive requests, we use WebSTAT [10] and the blackbox IDS of [8]: all alerts generated have been confirmed to be false positives. Thus we have a high confidence in the fact that the traffic does not contain successful attacks.…”
Section: Evaluation Of the False Positive Ratementioning
confidence: 99%