A closer look at intrusion detection system for web applications

N Agarwal, SZ Hussain - Security and Communication …, 2018 - Wiley Online Library
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the
web. IDS is a known methodology for detecting network‐based attacks but is still immature …

Leveraging deep neural networks for anomaly‐based web application firewall

A Moradi Vartouni, M Teshnehlab… - IET Information …, 2019 - Wiley Online Library
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …

Technologies for web and cloud service interaction: a survey

H Lampesberger - Service Oriented Computing and Applications, 2016 - Springer
The evolution of Web and service technologies has led to a wide landscape of standards
and protocols for interaction between loosely coupled software components. Examples …

The Holy Grail of" Systems for Machine Learning" Teaming humans and machine learning for detecting cyber threats

I Arnaldo, K Veeramachaneni - ACM SIGKDD Explorations Newsletter, 2019 - dl.acm.org
Although there is a large corpus of research focused on using machine learning to detect
cyber threats, the solutions presented are rarely actually adopted in the real world. In this …

Automatic detection of http injection attacks using convolutional neural network and deep neural network

V Odumuyiwa, A Chibueze - Journal of Cyber …, 2020 - journals.riverpublishers.com
HTTP injection attacks are well known cyber security threats with fatal consequences. These
attacks initiated by malicious entities (either human or computer) send dangerous or unsafe …

A novel semantic-aware approach for detecting malicious web traffic

J Yang, L Wang, Z Xu - … 19th International Conference, ICICS 2017, Bei**g …, 2018 - Springer
With regard to web compromise, malicious web traffic refers to requests from users visiting
websites for malicious targets, such as web vulnerabilities, web shells and uploaded …

Auto-threshold deep SVDD for anomaly-based web application firewall

AM Vartouni, M Shokri, M Teshnehlab - Authorea Preprints, 2021 - techrxiv.org
Protecting websites and applications from cyber-threats is vital for any organization. A Web
application firewall (WAF) prevents attacks to damaging applications. This provides a web …

Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall

A Moradi Vartouni, S Mehralian… - International Journal of …, 2019 - ijict.itrc.ac.ir
Web Application Firewall (WAF) is known as one of the Intrusion Detection System (IDS)
solutions for protecting web servers from HTTP attacks. WAF is a tool to identify and prevent …

Monitoring of client-cloud interaction

H Lampesberger, M Rady - Correct software in web applications and web …, 2015 - Springer
When a client consumes a cloud service, computational liabilities are transferred to the
service provider in accordance to the cloud paradigm, and the client loses some control over …

A parameter-free method for the detection of web attacks

G de la Torre-Abaitua, LF Lago-Fernández… - … Joint Conference SOCO' …, 2018 - Springer
Logs integration is one of the most challenging concerns in current security systems.
Certainly, the accurate identification of security events requires to handle and merge highly …