Leveraging deep neural networks for anomaly‐based web application firewall

A Moradi Vartouni, M Teshnehlab… - IET Information …, 2019 - Wiley Online Library
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …

WINDS: A wavelet-based intrusion detection system for controller area network (CAN)

M Bozdal, M Samie, IK Jennions - IEEE Access, 2021 - ieeexplore.ieee.org
Vehicles are equipped with Electronic Control Units (ECUs) to increase their overall system
functionality and connectivity. However, the rising connectivity exposes a defenseless …

URL query string anomaly sensor designed with the bidimensional Haar wavelet transform

A Kozakevicius, C Cappo, BA Mozzaquatro… - International Journal of …, 2015 - Springer
In this paper, the 2D Haar wavelet transform is the proposed analysis technique for HTTP
traffic data. Web attacks are detected by two threshold operations applied to the wavelet …

[PDF][PDF] Detecting encrypted attacks in software-defined networking

CV Neu - 2019 - repositorio.pucrs.br
A segurança é uma das principais preocupações da comunidade de redes de
computadores devido ao aumento de fluxos maliciosos. Atualmente, a criptografia está …

[PDF][PDF] Comparison of different threshold values for a wavelet designed attack sensor

C Cappo, CE Schaerer, A Kozakevicius… - XXXIV Congresso Nac …, 2012 - academia.edu
Wavelet transform has emerged recently as a tool to detect web traffic anomalies. Under the
assumption that an attack produces a substantial variation on the web traffic, to identify …

Contribution des techniques de datamining dans l'amélioration des systèmes de détection d'intrusion dans les réseaux informatiques

K ABDELKADER - 2017 - dspace.univ-sba.dz
Résumé (Français et/ou Anglais): L'utilisation continue des réseaux informatiques et du web
dans la société d'aujourd'hui a fait que les ressources de la majorité des systèmes …

O Uso da Transformada de Haar na Detecçao de Anomalias no Tráfego Web

C Cappo, RC Nunes, BA Mozzaquatro… - Simpósio Brasileiro de …, 2013 - sol.sbc.org.br
Em sistemas computacionais a informação é um ativo que está sujeito a inúmeras ameaças.
No tráfego web, o conjunto de caracteres contido nas requisições HTTP enviadas a uma …