Intrusion Attack Pattern Analysis and Signature Extraction for Web Services Using Honeypots.
Nirmal DagdeeUrjita ThakarPublished in: ICETET (2008)
Keyphrases
- pattern analysis
- web services
- network intrusion
- intrusion detection
- intrusion detection system
- pattern recognition
- network intrusion detection
- network security
- malicious users
- alert correlation
- denial of service attacks
- computational intelligence
- anomaly detection
- network intrusions
- pattern classification
- image analysis
- attack scenarios
- attack detection
- forensic analysis
- network traffic
- semantic web services
- data analysis
- service providers
- detecting malicious
- web applications
- signature verification
- information extraction
- computer networks
- dos attacks
- web service composition
- fraud detection
- real world
- business processes
- service oriented
- service oriented architecture
- attack graph
- service discovery
- computer vision