{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T18:45:55Z","timestamp":1751481955408,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/itcc.2004.1286431","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"90-96 Vol.1","source":"Crossref","is-referenced-by-count":4,"title":["Web server attack categorization based on root causes and their locations"],"prefix":"10.1109","author":[{"family":"Jeongseok Seo","sequence":"first","affiliation":[]},{"family":"Han-Sung Kim","sequence":"additional","affiliation":[]},{"family":"Sanghyun Cho","sequence":"additional","affiliation":[]},{"family":"Sungdeok Cha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SecurityFocus Online","year":"0","key":"19"},{"journal-title":"Insertion evasion and denial of service Eluding network intrusion detection","year":"1998","author":"ptacek","key":"17"},{"key":"18","article-title":"Snort - Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of LISA 13th Systems Administration Conference Seattle"},{"journal-title":"Internet Cookies Security Implications","year":"2000","author":"perkins","key":"15"},{"journal-title":"Anatomy of A Web Application Security Considerations","year":"2001","author":"pettit","key":"16"},{"year":"0","key":"13"},{"key":"14","article-title":"Smashing the stack for fun and profit","author":"one","year":"1996","journal-title":"BugTraq Report"},{"key":"11","article-title":"Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics","author":"handley","year":"2001","journal-title":"Proceedings of USENIX Security Symposium"},{"journal-title":"Tivoli Risk Manager Product","year":"0","key":"12"},{"key":"3","article-title":"2002 CSI\/FBI computer crime and security survey","volume":"8","year":"2002","journal-title":"Computer Security Issues & Trends"},{"journal-title":"The Open Source Network Ids","year":"0","key":"21"},{"journal-title":"Writing Secure Cgi Scripts","year":"0","key":"2"},{"journal-title":"System Network Intrusion Detection System","year":"0","key":"20"},{"journal-title":"How to Remove Meta-characters from User-supplied Data in Cgi Scripts","year":"0","key":"1"},{"journal-title":"Common Vulnerabilities and Exposures","year":"0","key":"10"},{"year":"0","key":"7"},{"journal-title":"Fundamentals of Computer Security Technology","year":"1994","author":"amoroso","key":"6"},{"key":"5","first-page":"157","article-title":"A lightweight tool for detecting web server attacks","author":"almgren","year":"2000","journal-title":"Proceedings of NDSS"},{"key":"4","article-title":"Towards a taxonomy of intrusion detection systems and attacks","author":"alessandri","year":"2001","journal-title":"Malicious- and Accidental-fault Tolerance for Internet Applications"},{"journal-title":"White House Web Site Shut Down after Hacking Attempt","year":"1999","key":"9"},{"journal-title":"Hackers Retaliate By Invading FBI Senate Web Sites","year":"1999","key":"8"}],"event":{"name":"International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.","start":{"date-parts":[[2004,4,5]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2004,4,7]]}},"container-title":["International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9035\/28682\/01286431.pdf?arnumber=1286431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T18:43:54Z","timestamp":1489430634000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1286431\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/itcc.2004.1286431","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}