A detailed investigation and analysis of using machine learning techniques for intrusion detection

P Mishra, V Varadharajan… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …

Ensemble based collaborative and distributed intrusion detection systems: A survey

G Folino, P Sabatino - Journal of Network and Computer Applications, 2016 - Elsevier
Modern network intrusion detection systems must be able to handle large and fast changing
data, often also taking into account real-time requirements. Ensemble-based data mining …

Intrusion detection using payload embeddings

M Hassan, ME Haque, ME Tozal, V Raghavan… - IEEE …, 2021 - ieeexplore.ieee.org
Attacks launched over the Internet often degrade or disrupt the quality of online services.
Various Intrusion Detection Systems (IDSs), with or without prevention capabilities, have …

Senet-i: An approach for detecting network intrusions through serialized network traffic images

YA Farrukh, S Wali, I Khan, ND Bastian - Engineering Applications of …, 2023 - Elsevier
The exponential growth of the internet and inter-connectivity has resulted in an extensive
increase in network size and the corresponding data, which has led to numerous novel …

Prevention of SQL Injection attack using query transformation and hashing

D Kar, S Panigrahi - 2013 3rd IEEE International Advance …, 2013 - ieeexplore.ieee.org
In this Internet age, web applications have become an integral part of our lives, but security
and privacy of our sensitive data has become a big concern. Over last several years, SQL …

On automatic detection of SQL injection attacks by the feature extraction of the single character

M Sonoda, T Matsuda, D Koizumi… - Proceedings of the 4th …, 2011 - dl.acm.org
The SQL injection attack causes very serious problem to web applications which have
database including personal data. To detect the SQL injection attack, the parsing and the …

You surf so strange today: Anomaly detection in web services via hmm and ctmc

M Favaretto, R Spolaor, M Conti, M Ferrante - Green, Pervasive, and …, 2017 - Springer
In recent years, with the increasing number of attacks against user privacy in web services,
researchers put a significant effort on realizing more and more sophisticated Intrusion …

[PDF][PDF] Anomaly-based techniques for web attacks detection

BA Mozzaquatro, RP de Azevedo… - Journal of Applied …, 2011 - researchgate.net
The widespread use of the Internet comes accompanied with severe threats for web
applications security. Intrusion Detection Systems (IDS) have been considered to deal with …

[PDF][PDF] Web Application Forensics

J Müller, J Schwenk, IM Heiderich - 2012 - homepage.ruhr-uni-bochum.de
Logfiles are the primary source of information to reconstruct events when network services
are compromised. However, extracting the relevant information from huge files can be a …

文字単位の特徴抽出による SQL インジェクション攻撃検出法について

園田道夫, 松田健, 小泉大城… - 研究報告コンピュータ …, 2011 - ipsj.ixsq.nii.ac.jp
論文抄録 従来の研究においては, SQL インジェクション攻撃の検出は構文解析や過去の攻撃手法
をブラックリスト化したものが広く使われている. しかし, これらのアプローチでは …