ModSecurity

Known as: Mod security 
ModSecurity supplies an array of request filtering and other security features to the Apache HTTP Server, IIS and NGINX. ModSecurity is a web… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2007-2018
012320072018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Web applications are permanently being exposed to attacks that exploit their vulnerabilities. In this work we investigate the… (More)
  • table I
  • figure 1
  • table II
  • table III
  • figure 2
Is this relevant?
2015
2015
Web application firewalls are an indispensable layer to protect online systems from attacks. However, the fast pace at which new… (More)
  • figure 2
  • table I
  • figure 6
  • figure 5
  • figure 7
Is this relevant?
2014
2014
A web attack is an attack against a web server through the HTTP Protocol. By analyzing known web attacks, we find out that each… (More)
Is this relevant?
2014
2014
Performance is an important indicator of firewalls effectiveness, which represents capability of firewalls handling network… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
Is this relevant?
2013
2013
With the development of the Internet, Web advertisements are increasingly used for illegal purposes such as propagating malware… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2013
Review
2013
In this paper, we address the overlooked problem of CrossSite Scripting (XSS) on mobile versions of web applications. We have… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2012
2012
Web Application Firewalls (WAFs) are used to detect and block attacks against vulnerable web applications. They distinguish… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
In the Web 2.0 generation, network system faced the racket “Web attack”. Traditional network security devices like Firewall and… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
Is this relevant?
2009
2009
Angriffe auf die Datensicherheit erfolgen heute häufig über das http-Protokoll. Klassische Firewalls bieten keinen Schutz vor SQL… (More)
Is this relevant?
2007
2007
The paper presents a concept of support for the design and analysis of Internet security systems with a rule-based methodology… (More)
  • table 1
  • figure 1
  • figure 2
Is this relevant?