A distributed deep learning system for web attack detection on edge devices

Z Tian, C Luo, J Qiu, X Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT
devices and sensors transmit huge amounts of data to cloud data centers for further …

Signature-based and machine-learning-based web application firewalls: A short survey

S Applebaum, T Gaber, A Ahmed - Procedia Computer Science, 2021 - Elsevier
Abstract Web Application Firewalls (WAF) have evolved to protect web applications from
attack. A signature-based WAF responds to threats through the implementation of …

An anomaly detection method to detect web attacks using stacked auto-encoder

AM Vartouni, SS Kashi… - 2018 6th Iranian Joint …, 2018 - ieeexplore.ieee.org
Network borne attacks are currently major threats to information security. Enormous efforts
such as scanners, encryption devices, intrusion detection systems and firewalls have been …

OCPAD: One class Naive Bayes classifier for payload based anomaly detection

M Swarnkar, N Hubballi - Expert Systems with Applications, 2016 - Elsevier
Application specific attack detection requires packet payload analysis. Current payload
analysis techniques suffer from failed detection as they use only the presence or absence of …

Deep anomaly detection in packet payload

J Liu, X Song, Y Zhou, X Peng, Y Zhang, P Liu, D Wu… - Neurocomputing, 2022 - Elsevier
With the wide deployment of edge devices, a variety of emerging applications have been
deployed at the edge of network. To guarantee the safe and efficient operations of the edge …

Leveraging deep neural networks for anomaly‐based web application firewall

A Moradi Vartouni, M Teshnehlab… - IET Information …, 2019 - Wiley Online Library
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …

Detecting attacks on web applications using autoencoder

H Mac, D Truong, L Nguyen, H Nguyen… - Proceedings of the 9th …, 2018 - dl.acm.org
Web attacks have become a real threat to the Internet. This paper proposes the use of
autoencoder to detect malicious pattern in the HTTP/HTTPS requests. The autoencoder is …

[HTML][HTML] Google search based sentiment indexes

A Brochado - IIMB Management Review, 2020 - Elsevier
This study sought to confirm whether Internet search based data have the potential both to
reveal populations' underlying beliefs directly and to affect stock markets of countries–in this …

[HTML][HTML] A compression-based method for detecting anomalies in textual data

G de la Torre-Abaitua, LF Lago-Fernández, D Arroyo - Entropy, 2021 - mdpi.com
Nowadays, information and communications technology systems are fundamental assets of
our social and economical model, and thus they should be properly protected against the …

Assessing the impact of bag‐of‐words versus word‐to‐vector embedding methods and dimension reduction on anomaly detection from log files

Z Qiu, Z Zhou, B Niblett, A Johnston… - … Journal of Network …, 2024 - Wiley Online Library
In terms of cyber security, log files represent a rich source of information regarding the state
of a computer service/system. Automating the process of summarizing log file content …