Xiaofeng Yang, Mingming Sun, Xuelei Hu, Jingyu Yang
{"title":"基于语法的HTTP攻击异常方法","authors":"Xiaofeng Yang, Mingming Sun, Xuelei Hu, Jingyu Yang","doi":"10.1109/CCPR.2009.5344007","DOIUrl":null,"url":null,"abstract":"HTTP-related vulnerabilities are being more commonly exploited as HTTP applications becoming the number one application across the Internet. Several HTTP specific anomaly methods have been proposed, among which grammar-based methods tend more likely to reflect the underlying structure of HTTP communications, therefore showed a promising classifying capability between benign and malicious accesses. Because of being separately proposed among other methods, grammar-based methods have not been summarized and compared directly on the same dataset. This paper presents several grammar-based anomaly methods for HTTP attacks, reveals their detecting capabilities, common features, strengths and drawbacks in comparison with each other.","PeriodicalId":354468,"journal":{"name":"2009 Chinese Conference on Pattern Recognition","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Grammar-Based Anomaly Methods for HTTP Attacks\",\"authors\":\"Xiaofeng Yang, Mingming Sun, Xuelei Hu, Jingyu Yang\",\"doi\":\"10.1109/CCPR.2009.5344007\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"HTTP-related vulnerabilities are being more commonly exploited as HTTP applications becoming the number one application across the Internet. Several HTTP specific anomaly methods have been proposed, among which grammar-based methods tend more likely to reflect the underlying structure of HTTP communications, therefore showed a promising classifying capability between benign and malicious accesses. Because of being separately proposed among other methods, grammar-based methods have not been summarized and compared directly on the same dataset. This paper presents several grammar-based anomaly methods for HTTP attacks, reveals their detecting capabilities, common features, strengths and drawbacks in comparison with each other.\",\"PeriodicalId\":354468,\"journal\":{\"name\":\"2009 Chinese Conference on Pattern Recognition\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Chinese Conference on Pattern Recognition\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCPR.2009.5344007\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Chinese Conference on Pattern Recognition","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCPR.2009.5344007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
HTTP-related vulnerabilities are being more commonly exploited as HTTP applications becoming the number one application across the Internet. Several HTTP specific anomaly methods have been proposed, among which grammar-based methods tend more likely to reflect the underlying structure of HTTP communications, therefore showed a promising classifying capability between benign and malicious accesses. Because of being separately proposed among other methods, grammar-based methods have not been summarized and compared directly on the same dataset. This paper presents several grammar-based anomaly methods for HTTP attacks, reveals their detecting capabilities, common features, strengths and drawbacks in comparison with each other.