Pattern Recognition Approach for Anomaly Detection of Web-based Attacks
- Publisher:
- CSIRO
- Publication Type:
- Conference Proceeding
- Citation:
- The Seventh Annual CSIRO ICT Centre Science and Engineering Conference, 2010, pp. 1 - 2
- Issue Date:
- 2010-01
Open Access
Copyright Clearance Process
- Recently Added
- In Progress
- Open Access
This item is open access.
The universal use of the Internet has made it more difficult to achieve high security. Attackers target web applications instead of Telnet ports. Cyber-attacks and breaches of information security are increasing in frequency. The goal of Intrusion Detection Systems (IDSs) is to monitor network traffic and detect web-based attacks. Common IDSs are either signature based or anomaly based. Signature based IDS is unable to detect novel attack (Le., zero-day) or polymorphic attacks, until the signature database is updated. On the other hand, an anomaly-based IDS can detect new attacks and polymorphic attacks. However, anomaly based system has a relatively high number of false positives.
Please use this identifier to cite or link to this item: