TY - GEN
T1 - Web server attack categorization based on root causes and their locations
AU - Seo, Jeongseok
AU - Kim, Han Sung
AU - Cho, Sanghyun
AU - Cha, Sungdeok
PY - 2004
Y1 - 2004
N2 - Frequency of attacks on web services and resulting damage continue to grow as web services become popular. Unfortunately, existing signature-based intrusion detection techniques are inadequate in providing reasonable degree of web security. Web attacks are diverse in nature, and typical web architecture consists of complex and hierarchically organized components. Because attack strategies often vary depending on the web contents, it is impossible to develop fixed patterns capturing unknown attacks. Protection mechanisms such as anomaly-based intrusion detection and application-level IDS, tailored to web services, are needed to detect web attacks. The first step in developing web application IDS is to analyze and categorize possible web attacks and vulnerabilities. In this paper, we classify web attacks by analyzing the root causes and the locations where they occur. This research is useful in developing web IDS modules, tracking emerging trends on web attacks, and testing web applications against potential vulnerabilities.
AB - Frequency of attacks on web services and resulting damage continue to grow as web services become popular. Unfortunately, existing signature-based intrusion detection techniques are inadequate in providing reasonable degree of web security. Web attacks are diverse in nature, and typical web architecture consists of complex and hierarchically organized components. Because attack strategies often vary depending on the web contents, it is impossible to develop fixed patterns capturing unknown attacks. Protection mechanisms such as anomaly-based intrusion detection and application-level IDS, tailored to web services, are needed to detect web attacks. The first step in developing web application IDS is to analyze and categorize possible web attacks and vulnerabilities. In this paper, we classify web attacks by analyzing the root causes and the locations where they occur. This research is useful in developing web IDS modules, tracking emerging trends on web attacks, and testing web applications against potential vulnerabilities.
UR - http://www.scopus.com/inward/record.url?scp=3042546549&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:3042546549
SN - 0769521088
T3 - International Conference on Information Technology: Coding Computing, ITCC
SP - 90
EP - 96
BT - International Conferen ON Information Technology
A2 - Srimani, P.K.
A2 - Abraham, A.
A2 - Cannataro, M.
A2 - Domingo-Ferrer, J.
A2 - Hashemi, R.
T2 - International Conference on Information Technology: Coding Computing, ITCC 2004
Y2 - 5 April 2004 through 7 April 2004
ER -