2016 19th International Conference on Network-Based Information Systems (NBiS) 2016
DOI: 10.1109/nbis.2016.25
|View full text |Cite
|
Sign up to set email alerts
|

Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…In contrast, white-list technique is used to gather and classify the information of reliable sources for legitimate uses [153]. The application of white-list or blacklist techniques have been studied in the literature [43,22,112]. In [112], the authors proposed an authentication-based approach which classifies the access to the Uniform Resource Locators (URLs) based on three defined lists: white-list, blacklist, or gray-list.…”
Section: F Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, white-list technique is used to gather and classify the information of reliable sources for legitimate uses [153]. The application of white-list or blacklist techniques have been studied in the literature [43,22,112]. In [112], the authors proposed an authentication-based approach which classifies the access to the Uniform Resource Locators (URLs) based on three defined lists: white-list, blacklist, or gray-list.…”
Section: F Anomaly Detectionmentioning
confidence: 99%
“…The application of white-list or blacklist techniques have been studied in the literature [43,22,112]. In [112], the authors proposed an authentication-based approach which classifies the access to the Uniform Resource Locators (URLs) based on three defined lists: white-list, blacklist, or gray-list. They showed that the proposed system can improve the accuracy of the suspicious the gray-list, white-list, and black-list, and further reduce the authentication frequency for the user accessing the URLs.…”
Section: F Anomaly Detectionmentioning
confidence: 99%