{"title":"追踪针对Web应用程序的Web攻击的来源","authors":"Shuo Wen, Qi Wu, Xingmin Wu, Yi Ling, Zhuolin Ye","doi":"10.1145/3480651.3480654","DOIUrl":null,"url":null,"abstract":"Nowadays, with the popularity of the computer network, we are facing to complex web service functions and rampant web attacks. In this paper, a research on web attack traceback technology is present for accurately identifying attack source, timely blocking target IP, patching service vulnerability, storing and identifying attack vectors. Existing traceback systems need to change web-based business code or architecture of server route, however, our traceback system can analyze and manage web access behaviors via proxy server, require no agent, and simulate the traceback to source of web attack with the features such as high compatibility, low performance overhead and quick traceback.","PeriodicalId":305943,"journal":{"name":"Proceedings of the 2021 International Conference on Pattern Recognition and Intelligent Systems","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Toward Tracing the Source of Web Attacks Targeted at Web Applications\",\"authors\":\"Shuo Wen, Qi Wu, Xingmin Wu, Yi Ling, Zhuolin Ye\",\"doi\":\"10.1145/3480651.3480654\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, with the popularity of the computer network, we are facing to complex web service functions and rampant web attacks. In this paper, a research on web attack traceback technology is present for accurately identifying attack source, timely blocking target IP, patching service vulnerability, storing and identifying attack vectors. Existing traceback systems need to change web-based business code or architecture of server route, however, our traceback system can analyze and manage web access behaviors via proxy server, require no agent, and simulate the traceback to source of web attack with the features such as high compatibility, low performance overhead and quick traceback.\",\"PeriodicalId\":305943,\"journal\":{\"name\":\"Proceedings of the 2021 International Conference on Pattern Recognition and Intelligent Systems\",\"volume\":\"65 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2021 International Conference on Pattern Recognition and Intelligent Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3480651.3480654\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 International Conference on Pattern Recognition and Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3480651.3480654","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Toward Tracing the Source of Web Attacks Targeted at Web Applications
Nowadays, with the popularity of the computer network, we are facing to complex web service functions and rampant web attacks. In this paper, a research on web attack traceback technology is present for accurately identifying attack source, timely blocking target IP, patching service vulnerability, storing and identifying attack vectors. Existing traceback systems need to change web-based business code or architecture of server route, however, our traceback system can analyze and manage web access behaviors via proxy server, require no agent, and simulate the traceback to source of web attack with the features such as high compatibility, low performance overhead and quick traceback.