{"id":"https://openalex.org/W2056267995","doi":"https://doi.org/10.1109/iri.2014.7051949","title":"Sniper: A framework for detecting attack attempts to open source web applications at the run time","display_name":"Sniper: A framework for detecting attack attempts to open source web applications at the run time","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W2056267995","doi":"https://doi.org/10.1109/iri.2014.7051949","mag":"2056267995"},"language":"en","primary_location":{"id":"doi:10.1109/iri.2014.7051949","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iri.2014.7051949","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060599629","display_name":"Abdullah Almurayh","orcid":"https://orcid.org/0000-0003-3471-4987"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abdullah Almurayh","raw_affiliation_strings":["Department of Computer Science, University of Colorado at Colorado Springs"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Colorado at Colorado Springs","institution_ids":["https://openalex.org/I888729015"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5060599629"],"corresponding_institution_ids":["https://openalex.org/I888729015"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12158565,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"633","last_page":"638"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.772881031036377},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7215225100517273},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.6690286993980408},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5678219199180603},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.5205041766166687},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.5168400406837463},{"id":"https://openalex.org/keywords/web-traffic","display_name":"Web traffic","score":0.4893290400505066},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.4682774543762207},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.2965850234031677},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.27943429350852966},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.24075213074684143},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.09588581323623657},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09121382236480713}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.772881031036377},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7215225100517273},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.6690286993980408},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5678219199180603},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.5205041766166687},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.5168400406837463},{"id":"https://openalex.org/C2777672014","wikidata":"https://www.wikidata.org/wiki/Q1172573","display_name":"Web traffic","level":3,"score":0.4893290400505066},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.4682774543762207},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.2965850234031677},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.27943429350852966},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.24075213074684143},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.09588581323623657},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09121382236480713},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iri.2014.7051949","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iri.2014.7051949","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W581048769","https://openalex.org/W1561593384","https://openalex.org/W1775663022","https://openalex.org/W2015952296","https://openalex.org/W2045960219","https://openalex.org/W2047967655","https://openalex.org/W2063106018","https://openalex.org/W2125631920","https://openalex.org/W2144154820","https://openalex.org/W2181326461","https://openalex.org/W2540620158","https://openalex.org/W6685821991","https://openalex.org/W6729041319"],"related_works":["https://openalex.org/W2130094614","https://openalex.org/W2003115932","https://openalex.org/W4249792249","https://openalex.org/W4385706035","https://openalex.org/W4249263872","https://openalex.org/W3011886893","https://openalex.org/W4238821156","https://openalex.org/W2799756903","https://openalex.org/W2381625382","https://openalex.org/W2276761883"],"abstract_inverted_index":{"Open":[0],"source":[1,26,44,112,207],"web":[2,27,45,77,113,138,208],"applications":[3,28,46],"offer":[4],"webmasters":[5],"and":[6,17,38,57,79,126,169,180,201],"owners":[7],"like":[8],"you":[9],"free":[10],"solutions":[11],"for":[12],"building":[13],"personal,":[14],"business,":[15],"official":[16],"social":[18],"network":[19],"websites.":[20],"On":[21],"the":[22,76,86,93,108,122,130,137,163,166,171],"other":[23],"hand,":[24],"open":[25,43,111,206],"allow":[29],"attackers":[30,56],"a":[31,48,89,98,104,116,211,216],"complete":[32],"map":[33],"of":[34,88,95,110,185],"its":[35],"structure,":[36],"design":[37],"functionality.":[39],"In":[40],"fact,":[41],"using":[42,203],"is":[47,134],"double-edged":[49],"sword":[50],"in":[51,92,121],"that":[52,71,221],"it":[53],"supplies":[54],"both":[55],"defenders":[58],"more":[59],"control":[60],"over":[61],"their":[62],"security":[63,109],"aspect.":[64],"Well-known":[65],"attacks":[66],"are":[67,72],"aimed":[68],"access":[69],"resources":[70],"not":[73,222],"referenced":[74],"by":[75,85,187],"application":[78,139],"lead":[80],"to":[81,124,140,161,192],"information":[82],"discloser.":[83],"Inspired":[84],"idea":[87],"sniper":[90,118],"lurking":[91],"shadows":[94],"civilization":[96],"as":[97],"secret":[99],"guard,":[100],"this":[101],"paper":[102],"proposes":[103],"framework-named":[105],"Sniper-to":[106],"improve":[107],"applications.":[114,209],"Mimicking":[115],"real":[117],"who":[119],"hides":[120],"bushes":[123],"watch":[125],"eliminate":[127],"dangerous":[128],"enemies,":[129],"proposed":[131],"Sniper":[132,156,178,198],"framework":[133],"hidden":[135],"within":[136],"capture":[141],"potential":[142],"attackers.":[143],"To":[144],"illustrate":[145],"further,":[146],"if":[147],"an":[148],"attacker":[149,172],"approaches":[150],"your":[151],"website":[152],"seeking":[153],"sensitive":[154,196],"data,":[155],"will":[157],"be":[158],"there":[159],"watching":[160],"detect":[162],"intrusion,":[164],"notify":[165],"webmaster":[167],"anonymously,":[168],"block":[170],"based":[173],"on":[174],"predefined":[175],"thresholds.":[176],"Therefore,":[177],"identifies":[179],"mitigates":[181],"attack":[182],"attempts":[183],"ahead":[184],"time":[186],"monitoring":[188,219],"suspicious":[189],"traffic":[190],"intended":[191],"reach":[193],"forbidden":[194],"or":[195],"areas.":[197],"was":[199],"implemented":[200],"tested":[202],"three":[204],"different":[205],"As":[210],"webmaster,":[212],"I":[213],"cannot":[214],"imagine":[215],"better":[217],"lights-out":[218],"solution":[220],"only":[223],"notifies":[224],"me,":[225],"but":[226],"also":[227],"blocks":[228],"potentially":[229],"malicious":[230],"access.":[231]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
