2018 6th International Symposium on Digital Forensic and Security (ISDFS) 2018
DOI: 10.1109/isdfs.2018.8355378
|View full text |Cite
|
Sign up to set email alerts
|

Web application attack detection and forensics: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 50 publications
0
7
0
Order By: Relevance
“…Authors in [127] presented a forensic model to investigate web activity, where the disk and live memory images are acquired to access web activity and search engine records. Later, a sort match or statistical analysis is performed to establish a correlation with a specific crime as discussed in [128], [129], [130]. These activities can critically represent human behavior.…”
Section: ) Web Forensicsmentioning
confidence: 99%
“…Authors in [127] presented a forensic model to investigate web activity, where the disk and live memory images are acquired to access web activity and search engine records. Later, a sort match or statistical analysis is performed to establish a correlation with a specific crime as discussed in [128], [129], [130]. These activities can critically represent human behavior.…”
Section: ) Web Forensicsmentioning
confidence: 99%
“…Article [11] is the only one in the list found to follow a systematic review approach, it discusses the implementation of deep learning in network IDS, and does not focus on web related intrusion detection methods. Articles [12], [13], [14] are dedicated for web intrusion detection however they are neither discussing the implementation of deep learning methods, nor following a systematic approach.…”
Section: Building Interpretable and Explainable Model 1 Contributionmentioning
confidence: 99%
“…As for dynamic detection methods, the most representative is a type of detection technology based on honeypot. [8][9][10] They usually run on the virtual environment and perform real-time detection of web pages. But a large overhead in terms of system resources and time cost can be introduced.…”
Section: Introductionmentioning
confidence: 99%
“…But these methods have generally a shortcoming of high false detection rate. As for dynamic detection methods, the most representative is a type of detection technology based on honeypot 8‐10 . They usually run on the virtual environment and perform real‐time detection of web pages.…”
Section: Introductionmentioning
confidence: 99%