Nguyen et al., 2019 - Google Patents
Preventing the attempts of abusing cheap-hosting Web-servers for monetization attacksNguyen et al., 2019
View PDF- Document ID
- 3634494340895823747
- Author
- Nguyen V
- Lin P
- Hwang R
- Publication year
- Publication venue
- arXiv preprint arXiv:1903.05470
External Links
Snippet
Over the past decades, the web is always one of the most popular targets of hackers. Today, along with the popular usage of open sources such as Wordpress and Joomla, the explosion of the vulnerabilities in such frameworks causes the websites using them to face …
- 230000001010 compromised 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bahrami et al. | Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures | |
Kirda et al. | Client-side cross-site scripting protection | |
Soltani et al. | A survey on real world botnets and detection mechanisms | |
Kara et al. | The ghost in the system: technical analysis of remote access trojan | |
Maulana et al. | Unmasking log4j’s vulnerability: protecting systems against exploitation through ethical hacking and cyberlaw perspectives | |
Gupta et al. | Taxonomy of cloud security | |
Ask et al. | Advanced persistent threat (APT) beyond the hype | |
Deng et al. | Lexical analysis for the webshell attacks | |
Nguyen et al. | Web attacks: defeating monetisation attempts | |
Diwan | An investigation and analysis of cyber security information systems: latest trends and future suggestion | |
Nguyen et al. | Preventing the attempts of abusing cheap-hosting Web-servers for monetization attacks | |
Alsmadi | Cyber threat analysis | |
Maybaum et al. | Technical methods, techniques, tools and effects of cyber operations | |
Victoire et al. | A Survey on Cyber Security Threats and its Impact on Society | |
Zammouri et al. | SafeBrowse: A new tool for strengthening and monitoring the security configuration of web browsers | |
Chen et al. | A proactive approach to intrusion detection and malware collection | |
Avlakulovich et al. | Understanding of Human Factors and Impact in Cybersecurity | |
Ekanayake et al. | What is cybersecurity: The reality of modern threats | |
Ganganagari | Defining Best Practices to Prevent Zero-Day and Polymorphic Attacks | |
RU2763115C1 (en) | Method for adjusting the parameters of a machine learning model in order to identify false triggering and information security incidents | |
Panagiotakopoulos | Assessing open and closed EDRs | |
Disso et al. | A distributed attack detection and mitigation framework | |
Kavithamani et al. | An analysis of remotely triggered malware exploits in content management system-based web applications | |
Alsmadi et al. | Information systems security management | |
Srivastava et al. | COMPUTER VIRUS AND ANTIVIRUS |