Detecting Remote File Inclusion Attack

Free registration required

Executive Summary

The biggest challenge standing in front of security experts is to detect attack that cannot easily be detected using signatures; Remote File Inclusion (RFI) is a good example of such as attack. This paper tries to present the challenges of accurately detecting RFI attacks. In order to achieve detection of unknown variants of the RFI attack it will try to define a generic solution to the problem instead of specific solution for known vulnerabilities by defining a generic rule set that will enable protecting applications from RFI attack.

  • Format: PDF
  • Size: 129.2 KB