{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:06Z","timestamp":1750308006512,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,4,23]],"date-time":"2006-04-23T00:00:00Z","timestamp":1145750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,4,23]]},"DOI":"10.1145\/1141277.1141361","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"361-368","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["An anomaly-driven reverse proxy for web applications"],"prefix":"10.1145","author":[{"given":"Fredrik","family":"Valeur","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"Technical University, Vienna"}]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[{"name":"Technical University, Vienna"}]}],"member":"320","published-online":{"date-parts":[[2006,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2005.1494469"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the ISOC Symposium on Network and Distributed Systems Security","author":"Almgren M.","year":"2000","unstructured":"M. Almgren , H. Debar , and M. Dacier . A lightweight tool for detecting web server attacks . In Proceedings of the ISOC Symposium on Network and Distributed Systems Security , San Diego, CA , February 2000 . M. Almgren, H. Debar, and M. Dacier. A lightweight tool for detecting web server attacks. In Proceedings of the ISOC Symposium on Network and Distributed Systems Security, San Diego, CA, February 2000."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/645839.670743"},{"key":"e_1_3_2_1_4_1","unstructured":"R. Andersson. punBB - fast and lightweight PHP-powered discussion board. http:\/\/www.punbb.org\/ 2005.  R. Andersson. punBB - fast and lightweight PHP-powered discussion board. http:\/\/www.punbb.org\/ 2005."},{"key":"e_1_3_2_1_5_1","volume-title":"June","author":"Security Breach","year":"2005","unstructured":"Breach Security . Breachgate. http:\/\/www.breach.com\/ , June 2005 . Breach Security. Breachgate. http:\/\/www.breach.com\/, June 2005."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Chen S.","year":"2005","unstructured":"S. Chen , J. Xu , and E. Sezer . Non-Control-Data Attacks Are Realistic Threats . In Proceedings of the USENIX Security Symposium , Baltimore, MD , August 2005 . S. Chen, J. Xu, and E. Sezer. Non-Control-Data Attacks Are Realistic Threats. In Proceedings of the USENIX Security Symposium, Baltimore, MD, August 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/www.cve.mitre.org\/","author":"Vulnerabilities Common","year":"2003","unstructured":"Common Vulnerabilities and Exposures. http:\/\/www.cve.mitre.org\/ , 2003 . Common Vulnerabilities and Exposures. http:\/\/www.cve.mitre.org\/, 2003."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948144"},{"key":"e_1_3_2_1_9_1","volume-title":"http:\/\/mybloggie.mywebland.com\/","author":"Bloggie","year":"2005","unstructured":"my Bloggie - PHP and mySQL Blog\/Weblog script. http:\/\/mybloggie.mywebland.com\/ , 2005 . myBloggie - PHP and mySQL Blog\/Weblog script. http:\/\/mybloggie.mywebland.com\/, 2005."},{"key":"e_1_3_2_1_10_1","volume-title":"http:\/\/www.mysql.com\/","author":"SQL","year":"2005","unstructured":"My SQL - The world's most popular open-source database. http:\/\/www.mysql.com\/ , 2005 . MySQL - The world's most popular open-source database. http:\/\/www.mysql.com\/, 2005."},{"key":"e_1_3_2_1_11_1","unstructured":"PHP\n  : Hypertext Preprocessor. http:\/\/www.php.net\/ 2005.  PHP: Hypertext Preprocessor. http:\/\/www.php.net\/ 2005."},{"key":"e_1_3_2_1_12_1","volume-title":"http:\/\/phpay.sourceforge.net\/","author":"Pay","year":"2005","unstructured":"ph Pay - webshop or catalog based on SQL and PHP. http:\/\/phpay.sourceforge.net\/ , 2005 . phPay - webshop or catalog based on SQL and PHP. http:\/\/phpay.sourceforge.net\/, 2005."},{"key":"e_1_3_2_1_13_1","unstructured":"K. Poulsen. Tower records settles charges over hack attacks. http:\/\/www.securityfocus.com\/news\/8508 April 2004.  K. Poulsen. Tower records settles charges over hack attacks. http:\/\/www.securityfocus.com\/news\/8508 April 2004."},{"key":"e_1_3_2_1_14_1","volume-title":"Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference","author":"Roesch M.","year":"1999","unstructured":"M. Roesch . Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference , Seattle, WA , November 1999 . M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference, Seattle, WA, November 1999."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceeding of the USENIX Security Symposium","author":"Sidiroglou K. A. S.","year":"2005","unstructured":"K. A. S. Sidiroglou , P. Akritidis , K. Xinidis , E. Markatos , and A. D. Keromytis . Detecting Targeted Attacks Using Shadow Honeypots . In Proceeding of the USENIX Security Symposium , Baltimore, MD , August 2005 . K. A. S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis. Detecting Targeted Attacks Using Shadow Honeypots. In Proceeding of the USENIX Security Symposium, Baltimore, MD, August 2005."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.4"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754723"},{"key":"e_1_3_2_1_18_1","volume-title":"October","author":"Reveals Too Much Victoria's Secret","year":"2003","unstructured":"Victoria's Secret Reveals Too Much . http:\/\/www.cbsnews.com\/ , October 2003 . Victoria's Secret Reveals Too Much. http:\/\/www.cbsnews.com\/, October 2003."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/956415.956437"}],"event":{"name":"SAC06: The 2006 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Dijon France","acronym":"SAC06"},"container-title":["Proceedings of the 2006 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1141277.1141361","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1141277.1141361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:31Z","timestamp":1750259191000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1141277.1141361"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4,23]]},"references-count":19,"alternative-id":["10.1145\/1141277.1141361","10.1145\/1141277"],"URL":"https:\/\/doi.org\/10.1145\/1141277.1141361","relation":{},"subject":[],"published":{"date-parts":[[2006,4,23]]},"assertion":[{"value":"2006-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}