期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Systematic Approach for Web Protection Runtime Tools’Effectiveness Analysis 被引量:1
1
作者 Tomás Sureda Riera Juan Ramón Bermejo Higuera +2 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo José Javier Martínez Herráiz 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第12期579-599,共21页
Web applications represent one of the principal vehicles by which attackers gain access to an organization’s network or resources.Thus,different approaches to protect web applications have been proposed to date.Of th... Web applications represent one of the principal vehicles by which attackers gain access to an organization’s network or resources.Thus,different approaches to protect web applications have been proposed to date.Of them,the two major approaches are Web Application Firewalls(WAF)and Runtime Application Self Protection(RASP).It is,thus,essential to understand the differences and relative effectiveness of both these approaches for effective decisionmaking regarding the security of web applications.Here we present a comparative study between WAF and RASP simulated settings,with the aim to compare their effectiveness and efficiency against different categories of attacks.For this,we used computation of different metrics and sorted their results using F-Score index.We found that RASP tools scored better than WAF tools.In this study,we also developed a new experimental methodology for the objective evaluation ofweb protection tools since,to the best of our knowledge,nomethod specifically evaluates web protection tools. 展开更多
关键词 web Application Firewall(WAF) Runtime Application Self Protection(RASP) F-Score web attacks experimental methodology
在线阅读 下载PDF
Research on Intrusion Detection Method of Web Service Composition
2
作者 Xiaosen Wen 《International Journal of Technology Management》 2013年第2期104-106,共3页
The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model ... The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model will monitor the Web server host resources, and finally discusses in detail the design and implementation of resource monitoring system. Intrusion detection model proposed can effectively regulate the behavior of users in this paper, allowing users follow a pre-standard service to call service providers, largely to protect the security of Web services. 展开更多
关键词 web attack network intrusion detection anomaly detection control flow graph
在线阅读 下载PDF
A Website Security Risk Assessment Method Based on the I-BAG Model
3
作者 Lin Liu Liang Liu +2 位作者 Cheng Huang Zhao Zhang Yong Fang 《China Communications》 SCIE CSCD 2016年第5期172-181,共10页
In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesi... In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesian attack graph model is established, which takes attack benefits and threat factors into consideration. Compared with the existing attack graph models, it can better describe the website's security risk. Then, the improved Bayesian attack graph is constructed with optimized website attack graph, attack benefit nodes, threat factor nodes and the local conditional probability distribution of each node, which is calculated accordingly. Finally, website's attack probability and risk value are calculated on the level of nodes, hosts and the whole website separately. The experimental results demonstrate that the risk evaluating method based on I-BAG model proposed is a effective way for assessing the website security risk. 展开更多
关键词 web security risk assessment attack graph Bayesian network
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部