Abstract
The Code Injection Attack (CIA) exploits a security vulnerability or computer bug that is caused by processing invalid data, CIA is a serious attack problem that attackers try to introduce any new methodologies to bypass the defense system. In this paper, we introduce a novel detection algorithm for detection of code injection attack. Our empirical performance shows that the proposed algorithm give better results compared to existing results.
Original language | English |
---|---|
Title of host publication | International Conference on Applications and Techniques in Cyber Security and Intelligence |
Subtitle of host publication | Applications and Techniques in Cyber Security and Intelligence |
Editors | Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam |
Place of Publication | Cham, Switzerland |
Publisher | Springer-Verlag London Ltd. |
Pages | 281-292 |
Number of pages | 12 |
Volume | 580 |
ISBN (Electronic) | 9783319670713 |
ISBN (Print) | 9783319670706 |
DOIs | |
Publication status | Published - 01 Jan 2018 |
Event | 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI) - Zhejiang Business Technology Institute, Ningbo, China Duration: 16 Jun 2017 → 18 Jun 2017 https://web.archive.org/web/20170228045429/http://aibd.us/ (Conference site) https://link.springer.com/book/10.1007/978-3-319-67071-3#bibliographic-information (Conference proceedings) |
Publication series
Name | Advances in Intelligent Systems and Computing |
---|---|
Volume | 580 |
ISSN (Print) | 2194-5357 |
ISSN (Electronic) | 2194-5365 |
Conference
Conference | 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI) |
---|---|
Country/Territory | China |
City | Ningbo |
Period | 16/06/17 → 18/06/17 |
Other | The 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence focuses on all aspects on techniques and applications in cyber and electronics security and intelligence research. The purpose of ATCI 2017 is to provide a forum for presentation and discussion of innovative ideas, cutting edge research results, and novel techniques, methods and applications on all aspects of cyber and electronics security and intelligence. As in previous years, the conference intends to attract the cyber security and cyber intelligence (e.g. big data) research community from around the world. Each submission will be reviewed by at least three independent experts, and the acceptance rate will be below 30%. We will invite three internationally renowned keynote speakers for this conference. |
Internet address |
|