Leveraging deep neural networks for anomaly‐based web application firewall
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …
services on the Internet. With the launch of web 2.0, information has flourished through …
WINDS: A wavelet-based intrusion detection system for controller area network (CAN)
Vehicles are equipped with Electronic Control Units (ECUs) to increase their overall system
functionality and connectivity. However, the rising connectivity exposes a defenseless …
functionality and connectivity. However, the rising connectivity exposes a defenseless …
URL query string anomaly sensor designed with the bidimensional Haar wavelet transform
In this paper, the 2D Haar wavelet transform is the proposed analysis technique for HTTP
traffic data. Web attacks are detected by two threshold operations applied to the wavelet …
traffic data. Web attacks are detected by two threshold operations applied to the wavelet …
[PDF][PDF] Detecting encrypted attacks in software-defined networking
CV Neu - 2019 - repositorio.pucrs.br
A segurança é uma das principais preocupações da comunidade de redes de
computadores devido ao aumento de fluxos maliciosos. Atualmente, a criptografia está …
computadores devido ao aumento de fluxos maliciosos. Atualmente, a criptografia está …
[PDF][PDF] Comparison of different threshold values for a wavelet designed attack sensor
Wavelet transform has emerged recently as a tool to detect web traffic anomalies. Under the
assumption that an attack produces a substantial variation on the web traffic, to identify …
assumption that an attack produces a substantial variation on the web traffic, to identify …
Contribution des techniques de datamining dans l'amélioration des systèmes de détection d'intrusion dans les réseaux informatiques
K ABDELKADER - 2017 - dspace.univ-sba.dz
Résumé (Français et/ou Anglais): L'utilisation continue des réseaux informatiques et du web
dans la société d'aujourd'hui a fait que les ressources de la majorité des systèmes …
dans la société d'aujourd'hui a fait que les ressources de la majorité des systèmes …
O Uso da Transformada de Haar na Detecçao de Anomalias no Tráfego Web
Em sistemas computacionais a informação é um ativo que está sujeito a inúmeras ameaças.
No tráfego web, o conjunto de caracteres contido nas requisições HTTP enviadas a uma …
No tráfego web, o conjunto de caracteres contido nas requisições HTTP enviadas a uma …