A closer look at intrusion detection system for web applications
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the
web. IDS is a known methodology for detecting network‐based attacks but is still immature …
web. IDS is a known methodology for detecting network‐based attacks but is still immature …
Leveraging deep neural networks for anomaly‐based web application firewall
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …
services on the Internet. With the launch of web 2.0, information has flourished through …
Technologies for web and cloud service interaction: a survey
H Lampesberger - Service Oriented Computing and Applications, 2016 - Springer
The evolution of Web and service technologies has led to a wide landscape of standards
and protocols for interaction between loosely coupled software components. Examples …
and protocols for interaction between loosely coupled software components. Examples …
The Holy Grail of" Systems for Machine Learning" Teaming humans and machine learning for detecting cyber threats
Although there is a large corpus of research focused on using machine learning to detect
cyber threats, the solutions presented are rarely actually adopted in the real world. In this …
cyber threats, the solutions presented are rarely actually adopted in the real world. In this …
Automatic detection of http injection attacks using convolutional neural network and deep neural network
V Odumuyiwa, A Chibueze - Journal of Cyber …, 2020 - journals.riverpublishers.com
HTTP injection attacks are well known cyber security threats with fatal consequences. These
attacks initiated by malicious entities (either human or computer) send dangerous or unsafe …
attacks initiated by malicious entities (either human or computer) send dangerous or unsafe …
A novel semantic-aware approach for detecting malicious web traffic
J Yang, L Wang, Z Xu - … 19th International Conference, ICICS 2017, Bei**g …, 2018 - Springer
With regard to web compromise, malicious web traffic refers to requests from users visiting
websites for malicious targets, such as web vulnerabilities, web shells and uploaded …
websites for malicious targets, such as web vulnerabilities, web shells and uploaded …
Auto-threshold deep SVDD for anomaly-based web application firewall
Protecting websites and applications from cyber-threats is vital for any organization. A Web
application firewall (WAF) prevents attacks to damaging applications. This provides a web …
application firewall (WAF) prevents attacks to damaging applications. This provides a web …
Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall
Web Application Firewall (WAF) is known as one of the Intrusion Detection System (IDS)
solutions for protecting web servers from HTTP attacks. WAF is a tool to identify and prevent …
solutions for protecting web servers from HTTP attacks. WAF is a tool to identify and prevent …
Monitoring of client-cloud interaction
When a client consumes a cloud service, computational liabilities are transferred to the
service provider in accordance to the cloud paradigm, and the client loses some control over …
service provider in accordance to the cloud paradigm, and the client loses some control over …
A parameter-free method for the detection of web attacks
G de la Torre-Abaitua, LF Lago-Fernández… - … Joint Conference SOCO' …, 2018 - Springer
Logs integration is one of the most challenging concerns in current security systems.
Certainly, the accurate identification of security events requires to handle and merge highly …
Certainly, the accurate identification of security events requires to handle and merge highly …