{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:21:43Z","timestamp":1730215303973,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/dsn.2014.21","type":"proceedings-article","created":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T21:38:58Z","timestamp":1412026738000},"page":"45-56","source":"Crossref","is-referenced-by-count":6,"title":["pSigene: Webcrawling to Generalize SQL Injection Signatures"],"prefix":"10.1109","author":[{"given":"Gaspar Modelo","family":"Howard","sequence":"first","affiliation":[]},{"given":"Christopher N.","family":"Gutierrez","sequence":"additional","affiliation":[]},{"given":"Fahad A.","family":"Arshad","sequence":"additional","affiliation":[]},{"given":"Saurabh","family":"Bagchi","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Qi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972384"},{"journal-title":"Bugtraq vulnerability database","year":"2008","key":"35"},{"key":"17","article-title":"Mechanisms for database intrusion detect ion and response","author":"kamra","year":"2008","journal-title":"Proc ACM SIGMOD IDAR"},{"key":"36","article-title":"An efficient black-box technique for defeating web application attacks","author":"sekar","year":"2009","journal-title":"NDSS Symposium"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989396"},{"journal-title":"Websec Sql Injection Pocket Reference","year":"2011","author":"salgado","key":"33"},{"journal-title":"Google Custom Search Api","year":"2012","key":"15"},{"journal-title":"Exploit Database","year":"2012","author":"security","key":"34"},{"journal-title":"IBM X-Force 2012 Trend and Risk Report","year":"2013","key":"16"},{"journal-title":"Web Application Security Platform","year":"2013","key":"39"},{"journal-title":"Open Source Vulnerability Database","year":"2012","author":"foundation","key":"13"},{"key":"14","article-title":"New sony hack exposes more consumer passwords","author":"goodin","year":"2011","journal-title":"The Register"},{"journal-title":"Snort IDS","year":"2008","key":"37"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1137\/0902001"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111070"},{"journal-title":"Suricata Intrusion Detection and Prevention Engine","year":"2012","author":"foundation","key":"12"},{"key":"21","article-title":"Learning fingerprints for a database intrusion detection system","author":"lee","year":"2002","journal-title":"Proc ESORICS"},{"journal-title":"Intrusio N Detection and Correlation Challenges and Solutions","year":"2004","author":"kruegel","key":"20"},{"journal-title":"Web Application Vulnerability Scanner Evaluation Project","year":"2012","key":"43"},{"key":"42","first-page":"3","article-title":"Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web r equests and sql queries","volume":"17","author":"vigna","year":"2009","journal-title":"J Comp Sec"},{"journal-title":"Modsecurity Core Rule Set","year":"2012","key":"41"},{"journal-title":"Snort rules","year":"2012","key":"40"},{"key":"44","article-title":"An architecture for generating semantics-aware signatures","author":"yegneswaran","year":"2005","journal-title":"Proc Usenix Security"},{"key":"22","article-title":"Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience","author":"li","year":"2006","journal-title":"Proc IEEE Symp Security and Privacy"},{"key":"23","volume":"28","author":"moscaritolo","year":"2011","journal-title":"Oracle's Mysql Com Hacked Via Sql Injection"},{"key":"24","article-title":"Polygraph: Automatically gener ating signatures for polymorphic worms","author":"newsome","year":"2005","journal-title":"Proc IEEE Security and Privacy"},{"journal-title":"National Vulnerability Database","year":"2008","key":"25"},{"journal-title":"MySQL 5 5 Reference Manual","year":"2012","key":"26"},{"journal-title":"Packetstorm Security Portal","year":"2012","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"29","article-title":"Behavioral clustering of http-base d malware and signature generation using malicious network traces","author":"perdisci","year":"2010","journal-title":"Proc USENIX NSDI"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866375"},{"journal-title":"Royal Navy Website Attacked by Romanian Hacker","year":"2010","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.95.25.14863"},{"journal-title":"Web Application Security Scanner Framework","year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btl060"},{"journal-title":"SQLmap","year":"0","author":"damele","key":"7"},{"journal-title":"SQL Injection Attacks and Defense","year":"2009","author":"clarke","key":"6"},{"key":"32","article-title":"Using generalization and characterization techniques in the anomaly-based detection of web attacks","author":"robertson","year":"2006","journal-title":"Proc of the NDSS Symposium"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043567"},{"key":"31","article-title":"Effective anomaly detection with scarce training data","author":"robertson","year":"2010","journal-title":"Proc of the NDSS Symposium"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866384"},{"journal-title":"Intrusion Detection Systems","year":"2008","author":"di pietro","key":"9"},{"journal-title":"Adobe Hacker Says He Used Sql Injection to Grab Database of 150 000 User Accounts","year":"2012","key":"8"}],"event":{"name":"2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2014,6,23]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2014,6,26]]}},"container-title":["2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6900116\/6903544\/06903566.pdf?arnumber=6903566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:58:17Z","timestamp":1602691097000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6903566"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/dsn.2014.21","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}