Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "a5a0d0ee-d7dc-4646-bfff-e4b042690270"}, "_deposit": {"id": "4936", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4936"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4936", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Network Intrusion Detection and Analyzing User-agent Field XSS Attack Log Files from Web Application", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Today web site hacks are on the rise and pose a greater threat than the broad-based network attacks as they threaten to steal critical customer, employee, and business partner information stored in applications and databases linked to the Web. Organizations collect vast amounts of data every day, including firewall logs, system logs, and intrusion detection alerts. Analyzing web traffic out of log files has advantages over analyzing traffic from the network. Web server log files contain only a fraction of the full HTTP request and response. A network Intrusion Detection System (NIDS) is placed in the network infrastructure where it can see the traffic to and from the web application. Cross-Site Scripting (XSS) attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. In this paper describes the detection of attacks on web application by analyzing user-agent field XSS log files from web servers (like Apache and IIS)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Network Intrusion detection system"}, {"interim": "HTTP"}, {"interim": "Cross-Site scripting"}, {"interim": "XSS log"}, {"interim": "Web Server"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "11083.pdf", "filesize": [{"value": "397 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 397000.0, "url": {"url": "https://meral.edu.mm/record/4936/files/11083.pdf"}, "version_id": "b2568e9b-7d03-4a69-96a9-587da5ceb392"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thu, Aye Aye"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/837"}, "item_title": "Network Intrusion Detection and Analyzing User-agent Field XSS Attack Log Files from Web Application", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004936", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4936", "relation": {}, "relation_version_is_last": true, "title": ["Network Intrusion Detection and Analyzing User-agent Field XSS Attack Log Files from Web Application"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Network Intrusion Detection and Analyzing User-agent Field XSS Attack Log Files from Web Application

http://hdl.handle.net/20.500.12678/0000004936
http://hdl.handle.net/20.500.12678/0000004936
34d2fdec-4700-4f0e-9792-371ccd62c342
a5a0d0ee-d7dc-4646-bfff-e4b042690270
None
Preview
Name / File License Actions
11083.pdf 11083.pdf (397 Kb)
Publication type
Article
Upload type
Publication
Title
Title Network Intrusion Detection and Analyzing User-agent Field XSS Attack Log Files from Web Application
Language en
Publication date 2013-02-26
Authors
Thu, Aye Aye
Description
Today web site hacks are on the rise and pose a greater threat than the broad-based network attacks as they threaten to steal critical customer, employee, and business partner information stored in applications and databases linked to the Web. Organizations collect vast amounts of data every day, including firewall logs, system logs, and intrusion detection alerts. Analyzing web traffic out of log files has advantages over analyzing traffic from the network. Web server log files contain only a fraction of the full HTTP request and response. A network Intrusion Detection System (NIDS) is placed in the network infrastructure where it can see the traffic to and from the web application. Cross-Site Scripting (XSS) attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. In this paper describes the detection of attacks on web application by analyzing user-agent field XSS log files from web servers (like Apache and IIS).
Keywords
Network Intrusion detection system, HTTP, Cross-Site scripting, XSS log, Web Server
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/837
Journal articles
Eleventh International Conference On Computer Applications (ICCA 2013)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:32:28.973416
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL