首页 > 最新文献

Proceedings of the 2006 ACM symposium on Applied computing最新文献

英文 中文
Detection and segmentation of tables and math-zones from document images 从文档图像中检测和分割表和数学区域
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141469
Sekhar Mandal, S. Chowdhury, A. Das, B. Chanda
We propose an algorithm to separate out tables and math-zones from document images. The algorithm relies on the spatial characteristics of tables and math-zones in a document. It has been observed that tables have distinct columns which imply that gaps between the fields are substantially larger than the gaps between the words in text lines and in math-zones the characters and symbols are less dense in comparison to normal text lines. These deceptively simple observations have led us to design a simple but powerful table and math-zone detection system with low computation cost.
我们提出了一种从文档图像中分离表格和数学区域的算法。该算法依赖于文档中表和数学区域的空间特征。人们观察到,表有不同的列,这意味着字段之间的间隙比文本行中单词之间的间隙大得多,而在数学区中,字符和符号的密度比正常文本行要低。这些看似简单的观察结果使我们设计了一个简单但功能强大、计算成本低的表和数学区检测系统。
{"title":"Detection and segmentation of tables and math-zones from document images","authors":"Sekhar Mandal, S. Chowdhury, A. Das, B. Chanda","doi":"10.1145/1141277.1141469","DOIUrl":"https://doi.org/10.1145/1141277.1141469","url":null,"abstract":"We propose an algorithm to separate out tables and math-zones from document images. The algorithm relies on the spatial characteristics of tables and math-zones in a document. It has been observed that tables have distinct columns which imply that gaps between the fields are substantially larger than the gaps between the words in text lines and in math-zones the characters and symbols are less dense in comparison to normal text lines. These deceptively simple observations have led us to design a simple but powerful table and math-zone detection system with low computation cost.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134343209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A contingency view of organizational infrastructure requirements engineering 组织基础设施需求工程的偶然性观点
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141628
Karl Cox, S. Bleistein, P. Reynolds, A. Thorogood
Delivery of IT projects in today's rapidly changing business environment is a challenge. Conventional investment approaches result in lumpy capital allocations, which encourage managers to include many potential future business requirements in each capital request. This locks in the delivery of future requirements despite high market uncertainty. The resulting projects are large and complex from both a technical and management perspective. In the management literature, new frameworks are emerging that draw on Real Options valuations to justify early infrastructure investment and provide fine-grained control over business initiatives in an uncertain world. Business managers can then build on the infrastructure by selecting business initiatives to maximise option value. However, this requires engineering approaches that separates infrastructure and business requirements and minimises their dependencies. This paper explores a contingency approach to Requirements Engineering (RE) to minimise initial requirements and maximise future strategic options, challenging the research community's dominant paradigm of completeness, correctness and consistency.
在当今快速变化的业务环境中交付IT项目是一项挑战。传统的投资方法导致了不稳定的资本配置,这鼓励管理者在每个资本请求中包含许多潜在的未来业务需求。这锁定了未来需求的交付,尽管市场存在很大的不确定性。从技术和管理的角度来看,由此产生的项目既大又复杂。在管理文献中,新的框架正在出现,这些框架利用实物期权估值来证明早期基础设施投资的合理性,并在不确定的世界中提供对业务计划的细粒度控制。然后,业务经理可以通过选择业务计划来构建基础设施,以最大化期权价值。然而,这需要分离基础设施和业务需求并最小化它们的依赖性的工程方法。本文探讨了需求工程(RE)的偶然性方法,以最小化初始需求并最大化未来的战略选择,挑战研究界的完整性、正确性和一致性的主导范式。
{"title":"A contingency view of organizational infrastructure requirements engineering","authors":"Karl Cox, S. Bleistein, P. Reynolds, A. Thorogood","doi":"10.1145/1141277.1141628","DOIUrl":"https://doi.org/10.1145/1141277.1141628","url":null,"abstract":"Delivery of IT projects in today's rapidly changing business environment is a challenge. Conventional investment approaches result in lumpy capital allocations, which encourage managers to include many potential future business requirements in each capital request. This locks in the delivery of future requirements despite high market uncertainty. The resulting projects are large and complex from both a technical and management perspective. In the management literature, new frameworks are emerging that draw on Real Options valuations to justify early infrastructure investment and provide fine-grained control over business initiatives in an uncertain world. Business managers can then build on the infrastructure by selecting business initiatives to maximise option value. However, this requires engineering approaches that separates infrastructure and business requirements and minimises their dependencies. This paper explores a contingency approach to Requirements Engineering (RE) to minimise initial requirements and maximise future strategic options, challenging the research community's dominant paradigm of completeness, correctness and consistency.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133154737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Domotic house gateway 家庭大门
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141730
Paolo Pellegrino, Dario Bonino, Fulvio Corno
This paper presents a domotic house gateway capable of seamlessly interacting with different devices from heterogeneous domotic systems and appliances. Such a gateway also provides the possibility to automate device cooperation through an embedded rule-based engine, which can be dynamically and automatically updated to accommodate necessities and anticipate users' actions. Some practical applications will show the effectiveness of the system.
本文提出了一种家庭网关,能够与来自异构家庭系统和设备的不同设备进行无缝交互。这样的网关还提供了通过嵌入式基于规则的引擎自动化设备合作的可能性,该引擎可以动态和自动更新,以适应需求并预测用户的操作。实际应用表明了该系统的有效性。
{"title":"Domotic house gateway","authors":"Paolo Pellegrino, Dario Bonino, Fulvio Corno","doi":"10.1145/1141277.1141730","DOIUrl":"https://doi.org/10.1145/1141277.1141730","url":null,"abstract":"This paper presents a domotic house gateway capable of seamlessly interacting with different devices from heterogeneous domotic systems and appliances. Such a gateway also provides the possibility to automate device cooperation through an embedded rule-based engine, which can be dynamically and automatically updated to accommodate necessities and anticipate users' actions. Some practical applications will show the effectiveness of the system.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115431335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Policy-driven reflective enforcement of security policies 策略驱动的安全策略的反射执行
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141645
I. Welch, Fan Lu
Practical experience has shown that separating security enforcement code from functional code using separation of concerns techniques such as behavioural reflection leads to improvements in code undestandability and maintainability. However, using these techniques at requires providing a consistent and declarative way to specify policies. We have developed a prototype tool that allows the use of Ponder policies that are enforced by the Kava metaobject protocol. This prototype translates high-level policies into configuration files used to enforce the policies upon Java applications.
实践经验表明,使用关注点分离技术(如行为反射)将安全执行代码与功能代码分离,可以提高代码的可理解性和可维护性。但是,使用这些技术需要提供一致的声明性方法来指定策略。我们已经开发了一个原型工具,它允许使用由Kava元对象协议强制执行的Ponder策略。该原型将高级策略转换为配置文件,用于在Java应用程序上执行策略。
{"title":"Policy-driven reflective enforcement of security policies","authors":"I. Welch, Fan Lu","doi":"10.1145/1141277.1141645","DOIUrl":"https://doi.org/10.1145/1141277.1141645","url":null,"abstract":"Practical experience has shown that separating security enforcement code from functional code using separation of concerns techniques such as behavioural reflection leads to improvements in code undestandability and maintainability. However, using these techniques at requires providing a consistent and declarative way to specify policies. We have developed a prototype tool that allows the use of Ponder policies that are enforced by the Kava metaobject protocol. This prototype translates high-level policies into configuration files used to enforce the policies upon Java applications.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115684235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Simplifying transformation of software architecture constraints 简化软件架构约束的转换
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141568
Chouki Tibermacine, Régis Fleurquin, Salah Sadou
The heterogeneity of the architectural constraint languages makes difficult the transformation of constraints throughout the development process. Indeed they have significantly different metamodels, which make the definition of mapping rules complex. In this paper, we present an approach that aims at simplifying transformations of architectural constraints. It is based on an architectural constraint language (ACL), which includes one core constraint expression language and different profiles. Each profile is defined upon a metamodel, which represents the architectural abstractions manipulated at each stage in the development process.
架构约束语言的异构性使得在整个开发过程中转换约束变得困难。实际上,它们具有明显不同的元模型,这使得映射规则的定义变得复杂。在本文中,我们提出了一种旨在简化架构约束转换的方法。它基于架构约束语言(ACL),其中包括一种核心约束表达语言和不同的配置文件。每个概要文件都是在元模型上定义的,元模型表示在开发过程的每个阶段操作的体系结构抽象。
{"title":"Simplifying transformation of software architecture constraints","authors":"Chouki Tibermacine, Régis Fleurquin, Salah Sadou","doi":"10.1145/1141277.1141568","DOIUrl":"https://doi.org/10.1145/1141277.1141568","url":null,"abstract":"The heterogeneity of the architectural constraint languages makes difficult the transformation of constraints throughout the development process. Indeed they have significantly different metamodels, which make the definition of mapping rules complex. In this paper, we present an approach that aims at simplifying transformations of architectural constraints. It is based on an architectural constraint language (ACL), which includes one core constraint expression language and different profiles. Each profile is defined upon a metamodel, which represents the architectural abstractions manipulated at each stage in the development process.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113994807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
To infinity and beyond or, avoiding the infinite in security protocol analysis 以无限和超越或,避免无限在安全协议分析
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141359
J. Heather, Steve A. Schneider
We investigate conditions under which an infinite set of atomic messages can be replaced with one or two values without affecting the correctness of a security protocol. The work is conducted using the strand spaces formalism, but the results apply to all protocol analysis techniques, and should be of particular value to those using model checking.The implications of the central result are discussed.
我们研究了可以用一个或两个值替换无限组原子消息而不影响安全协议正确性的条件。这项工作是使用链空间形式化进行的,但结果适用于所有协议分析技术,并且应该对那些使用模型检查的人具有特别的价值。讨论了中心结果的含义。
{"title":"To infinity and beyond or, avoiding the infinite in security protocol analysis","authors":"J. Heather, Steve A. Schneider","doi":"10.1145/1141277.1141359","DOIUrl":"https://doi.org/10.1145/1141277.1141359","url":null,"abstract":"We investigate conditions under which an infinite set of atomic messages can be replaced with one or two values without affecting the correctness of a security protocol. The work is conducted using the strand spaces formalism, but the results apply to all protocol analysis techniques, and should be of particular value to those using model checking.The implications of the central result are discussed.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114050197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving the compensated Horner scheme with a fused multiply and add 用融合乘加改进补偿霍纳方案
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141585
S. Graillat, P. Langlois, N. Louvet
Several different techniques and softwares intend to improve the accuracy of results computed in a fixed finite precision. Here we focus on a method to improve the accuracy of the polynomial evaluation. It is well known that the use of the Fused Multiply and Add operation available on some microprocessors like Intel Itanium improves slightly the accuracy of the Horner scheme. In this paper, we propose an accurate compensated Horner scheme specially designed to take advantage of the Fused Multiply and Add. We prove that the computed result is as accurate as if computed in twice the working precision. The algorithm we present is fast since it only requires well optimizable floating point operations, performed in the same working precision as the given data.
几种不同的技术和软件旨在提高在固定有限精度下计算结果的准确性。本文重点研究了一种提高多项式求值精度的方法。众所周知,在一些微处理器(如Intel Itanium)上使用融合乘法和加法操作可以略微提高霍纳方案的准确性。在本文中,我们提出了一种专门设计的精确补偿的Horner方案,利用了融合乘和加,并证明了计算结果的精度相当于工作精度的两倍。我们提出的算法很快,因为它只需要很好地优化浮点运算,在与给定数据相同的工作精度下执行。
{"title":"Improving the compensated Horner scheme with a fused multiply and add","authors":"S. Graillat, P. Langlois, N. Louvet","doi":"10.1145/1141277.1141585","DOIUrl":"https://doi.org/10.1145/1141277.1141585","url":null,"abstract":"Several different techniques and softwares intend to improve the accuracy of results computed in a fixed finite precision. Here we focus on a method to improve the accuracy of the polynomial evaluation. It is well known that the use of the Fused Multiply and Add operation available on some microprocessors like Intel Itanium improves slightly the accuracy of the Horner scheme. In this paper, we propose an accurate compensated Horner scheme specially designed to take advantage of the Fused Multiply and Add. We prove that the computed result is as accurate as if computed in twice the working precision. The algorithm we present is fast since it only requires well optimizable floating point operations, performed in the same working precision as the given data.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
MPEG-7 in action: end user experiences with COSMOS-7 front end systems MPEG-7的实际应用:COSMOS-7前端系统的终端用户体验
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141591
H. Agius, M. Angelides
MPEG-7 has become a key standard to multimedia research in searching, filtering and retrieval. Understanding experiences of users when using MPEG-7-based tools is necessary if we are to improve how MPEG-7 metadata is applied in practice. COSMOS-7 enables structured modeling and filtering of MPEG-7-compliant metadata for digital video. We describe two COSMOS-7 front end systems: COSMOSIS, for modeling digital video metadata, and the Filtering Manager, for filtering digital video metadata. We then present an empirical evaluation of these front end systems undertaken with a sample set of end users from a London, UK, theater company. Our results reveal that end users progress through a number of key stages when modeling and filtering video content.
MPEG-7已成为多媒体研究中搜索、过滤和检索的关键标准。如果我们要改进MPEG-7元数据在实践中的应用,就必须了解用户在使用基于MPEG-7的工具时的体验。COSMOS-7能够对数字视频的mpeg -7兼容元数据进行结构化建模和过滤。我们描述了两个COSMOS-7前端系统:COSMOSIS,用于数字视频元数据建模,以及滤波管理器,用于过滤数字视频元数据。然后,我们对这些前端系统进行了实证评估,其中包括来自英国伦敦一家剧院公司的一组最终用户样本。我们的研究结果表明,最终用户在建模和过滤视频内容时经历了许多关键阶段。
{"title":"MPEG-7 in action: end user experiences with COSMOS-7 front end systems","authors":"H. Agius, M. Angelides","doi":"10.1145/1141277.1141591","DOIUrl":"https://doi.org/10.1145/1141277.1141591","url":null,"abstract":"MPEG-7 has become a key standard to multimedia research in searching, filtering and retrieval. Understanding experiences of users when using MPEG-7-based tools is necessary if we are to improve how MPEG-7 metadata is applied in practice. COSMOS-7 enables structured modeling and filtering of MPEG-7-compliant metadata for digital video. We describe two COSMOS-7 front end systems: COSMOSIS, for modeling digital video metadata, and the Filtering Manager, for filtering digital video metadata. We then present an empirical evaluation of these front end systems undertaken with a sample set of end users from a London, UK, theater company. Our results reveal that end users progress through a number of key stages when modeling and filtering video content.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114235215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Editorial message: special track on data streams 编辑信息:关于数据流的特别跟踪
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141425
J. Aguilar-Ruiz, Francisco J. Ferrer-Troyano
Advances in data acquisition hardware and embedded systems have led to the data stream era. A growing number of emerging applications varying from business to scientific to industrial ones continuously generate open-ended data streams. In practice, such data cannot be stored but must be both queried and analyzed as they arrive, discarding it right away. In many cases, we need to extract some sort of knowledge from these continuous streams that challenge the scalability of several batch-learning methods. Therefore, this new field has attracted researchers from different disciplines over the past few years. Examples of data streams include customer click streams, networks event logs, telephone records, large sets of web pages, multimedia data, scientific data, and sets of retail chain transactions. Applications include credit card fraud protection, target marketing, and intrusion detection, for which it is not possible to collect all relevant input data. In these environments, KDD systems have to operate online under memory and time limitations.
数据采集硬件和嵌入式系统的进步导致了数据流时代的到来。从商业到科学再到工业,越来越多的新兴应用程序不断产生开放式数据流。在实践中,这些数据不能存储,必须在它们到达时进行查询和分析,并立即丢弃。在许多情况下,我们需要从这些连续的数据流中提取一些知识,这对一些批处理学习方法的可扩展性提出了挑战。因此,在过去的几年里,这一新的领域吸引了来自不同学科的研究人员。数据流的例子包括客户点击流、网络事件日志、电话记录、大型网页集、多媒体数据、科学数据和零售链交易集。应用程序包括信用卡欺诈保护、目标营销和入侵检测,因此不可能收集所有相关的输入数据。在这些环境中,KDD系统必须在内存和时间限制下在线运行。
{"title":"Editorial message: special track on data streams","authors":"J. Aguilar-Ruiz, Francisco J. Ferrer-Troyano","doi":"10.1145/1141277.1141425","DOIUrl":"https://doi.org/10.1145/1141277.1141425","url":null,"abstract":"Advances in data acquisition hardware and embedded systems have led to the data stream era. A growing number of emerging applications varying from business to scientific to industrial ones continuously generate open-ended data streams. In practice, such data cannot be stored but must be both queried and analyzed as they arrive, discarding it right away. In many cases, we need to extract some sort of knowledge from these continuous streams that challenge the scalability of several batch-learning methods. Therefore, this new field has attracted researchers from different disciplines over the past few years. Examples of data streams include customer click streams, networks event logs, telephone records, large sets of web pages, multimedia data, scientific data, and sets of retail chain transactions. Applications include credit card fraud protection, target marketing, and intrusion detection, for which it is not possible to collect all relevant input data. In these environments, KDD systems have to operate online under memory and time limitations.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114257074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An anomaly-driven reverse proxy for web applications 一个异常驱动的web应用程序反向代理
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141361
Fredrik Valeur, G. Vigna, Christopher Krügel, E. Kirda
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the compromise of entire networks. To ameliorate this situation, we propose an approach that composes a web-based anomaly detection system with a reverse HTTP proxy. The approach is based on the assumption that a web site's content can be split into security sensitive and non-sensitive parts, which are distributed to different servers. The anomaly score of a web request is then used to route suspicious requests to copies of the web site that do not hold sensitive content. By doing this, it is possible to serve anomalous but benign requests that do not require access to sensitive information, sensibly reducing the impact of false positives. We developed a prototype of our approach and evaluated its applicability with respect to several existing web-based applications, showing that our approach is both feasible and effective.
不小心开发基于web的应用程序会导致易受攻击的代码被部署并提供给整个Internet,从而创建易于利用的入口点,从而危及整个网络。为了改善这种情况,我们提出了一种基于web的异常检测系统与反向HTTP代理的方法。该方法基于一个假设,即网站的内容可以分为安全敏感部分和非敏感部分,这些部分分布在不同的服务器上。然后使用web请求的异常分数将可疑请求路由到不包含敏感内容的web站点副本。通过这样做,可以为不需要访问敏感信息的异常但良性的请求提供服务,从而显着减少误报的影响。我们开发了我们的方法的原型,并评估了它在几个现有的基于web的应用程序中的适用性,表明我们的方法既可行又有效。
{"title":"An anomaly-driven reverse proxy for web applications","authors":"Fredrik Valeur, G. Vigna, Christopher Krügel, E. Kirda","doi":"10.1145/1141277.1141361","DOIUrl":"https://doi.org/10.1145/1141277.1141361","url":null,"abstract":"Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the compromise of entire networks. To ameliorate this situation, we propose an approach that composes a web-based anomaly detection system with a reverse HTTP proxy. The approach is based on the assumption that a web site's content can be split into security sensitive and non-sensitive parts, which are distributed to different servers. The anomaly score of a web request is then used to route suspicious requests to copies of the web site that do not hold sensitive content. By doing this, it is possible to serve anomalous but benign requests that do not require access to sensitive information, sensibly reducing the impact of false positives. We developed a prototype of our approach and evaluated its applicability with respect to several existing web-based applications, showing that our approach is both feasible and effective.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
Proceedings of the 2006 ACM symposium on Applied computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1