-
RootNode
-
Co-operative College, Mandalay
-
Cooperative College, Phaunggyi
-
Co-operative University, Sagaing
-
Co-operative University, Thanlyin
-
Dagon University
-
Kyaukse University
-
Laquarware Technological college
-
Mandalay Technological University
-
Mandalay University of Distance Education
-
Mandalay University of Foreign Languages
-
Maubin University
-
Mawlamyine University
-
Meiktila University
-
Mohnyin University
-
Myanmar Institute of Information Technology
-
Myanmar Maritime University
-
National Management Degree College
-
Naypyitaw State Academy
-
Pathein University
-
Sagaing University
-
Sagaing University of Education
-
Taunggyi University
-
Technological University, Hmawbi
-
Technological University (Kyaukse)
-
Technological University Mandalay
-
University of Computer Studies, Mandalay
-
University of Computer Studies Maubin
-
University of Computer Studies, Meikhtila
-
University of Computer Studies Pathein
-
University of Computer Studies, Taungoo
-
University of Computer Studies, Yangon
-
University of Dental Medicine Mandalay
-
University of Dental Medicine, Yangon
-
University of Information Technology
-
University of Mandalay
-
University of Medicine 1
-
University of Medicine 2
-
University of Medicine Mandalay
-
University of Myitkyina
-
University of Public Health, Yangon
-
University of Veterinary Science
-
University of Yangon
-
West Yangon University
-
Yadanabon University
-
Yangon Technological University
-
Yangon University of Distance Education
-
Yangon University of Economics
-
Yangon University of Education
-
Yangon University of Foreign Languages
-
Yezin Agricultural University
-
New Index
-
Item
{"_buckets": {"deposit": "a5a0d0ee-d7dc-4646-bfff-e4b042690270"}, "_deposit": {"id": "4936", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4936"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4936", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Network Intrusion Detection and Analyzing User-agent Field XSS Attack Log Files from Web Application", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Today web site hacks are on the rise and pose a greater threat than the broad-based network attacks as they threaten to steal critical customer, employee, and business partner information stored in applications and databases linked to the Web. Organizations collect vast amounts of data every day, including firewall logs, system logs, and intrusion detection alerts. Analyzing web traffic out of log files has advantages over analyzing traffic from the network. Web server log files contain only a fraction of the full HTTP request and response. A network Intrusion Detection System (NIDS) is placed in the network infrastructure where it can see the traffic to and from the web application. Cross-Site Scripting (XSS) attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. In this paper describes the detection of attacks on web application by analyzing user-agent field XSS log files from web servers (like Apache and IIS)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Network Intrusion detection system"}, {"interim": "HTTP"}, {"interim": "Cross-Site scripting"}, {"interim": "XSS log"}, {"interim": "Web Server"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "11083.pdf", "filesize": [{"value": "397 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 397000.0, "url": {"url": "https://meral.edu.mm/record/4936/files/11083.pdf"}, "version_id": "b2568e9b-7d03-4a69-96a9-587da5ceb392"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thu, Aye Aye"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/837"}, "item_title": "Network Intrusion Detection and Analyzing User-agent Field XSS Attack Log Files from Web Application", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004936", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4936", "relation": {}, "relation_version_is_last": true, "title": ["Network Intrusion Detection and Analyzing User-agent Field XSS Attack Log Files from Web Application"], "weko_shared_id": -1}
Network Intrusion Detection and Analyzing User-agent Field XSS Attack Log Files from Web Application
http://hdl.handle.net/20.500.12678/0000004936
http://hdl.handle.net/20.500.12678/000000493634d2fdec-4700-4f0e-9792-371ccd62c342
a5a0d0ee-d7dc-4646-bfff-e4b042690270
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Network Intrusion Detection and Analyzing User-agent Field XSS Attack Log Files from Web Application | |||||
Language | en | |||||
Publication date | 2013-02-26 | |||||
Authors | ||||||
Thu, Aye Aye | ||||||
Description | ||||||
Today web site hacks are on the rise and pose a greater threat than the broad-based network attacks as they threaten to steal critical customer, employee, and business partner information stored in applications and databases linked to the Web. Organizations collect vast amounts of data every day, including firewall logs, system logs, and intrusion detection alerts. Analyzing web traffic out of log files has advantages over analyzing traffic from the network. Web server log files contain only a fraction of the full HTTP request and response. A network Intrusion Detection System (NIDS) is placed in the network infrastructure where it can see the traffic to and from the web application. Cross-Site Scripting (XSS) attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. In this paper describes the detection of attacks on web application by analyzing user-agent field XSS log files from web servers (like Apache and IIS). | ||||||
Keywords | ||||||
Network Intrusion detection system, HTTP, Cross-Site scripting, XSS log, Web Server | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/837 | |||||
Journal articles | ||||||
Eleventh International Conference On Computer Applications (ICCA 2013) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |