Deep learning for vulnerability and attack detection on web applications: A systematic literature review

RL Alaoui, EH Nfaoui - Future Internet, 2022 - mdpi.com
Web applications are the best Internet-based solution to provide online web services, but
they also bring serious security challenges. Thus, enhancing web applications security …

Anomaly detection for cyber-security based on convolution neural network: A survey

M Alabadi, Y Celik - 2020 International Congress on Human …, 2020 - ieeexplore.ieee.org
The expanding growth of computer and communication technologies results in a vast
amount of security concerns. Various types of cyber-security enabled mechanisms have …

Deep Learning within the Web Application Security Scope–Literature Review

M Kaniški, J Dobša, D Kermek - 2023 46th MIPRO ICT and …, 2023 - ieeexplore.ieee.org
Over the last few years, several breakthroughs in deep learning have contributed to the
development of new models. One of many areas they are applied to is the web application …

MC‐MLDCNN: Multichannel Multilayer Dilated Convolutional Neural Networks for Web Attack Detection

N Moarref, MT Sandıkkaya - Security and Communication …, 2023 - Wiley Online Library
The explosive growth of web‐based technology has led to an increase in sophisticated and
complex attacks that target web applications. To protect against this growing threat, a …

Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall

A Moradi Vartouni, S Mehralian… - … Journal of Information …, 2019 - journal.itrc.ac.ir
Web Application Firewall (WAF) is known as one of the Intrusion Detection System (IDS)
solutions for protecting web servers from HTTP attacks. WAF is a tool to identify and prevent …

A deep learning-based method for HTTP payload classification in attack detection

M Zhu, T Hong, Q Luo, X Shang - … International Conference on …, 2023 - spiedigitallibrary.org
Attack detection is a crucial process that involves closely monitoring and identifying
malicious attacks. To identify and locate such attacks with precision, there is a need for a …

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击 GRADUATE SCHOOL

N MOARREF - 2024 - polen.itu.edu.tr
A significant amount of sensitive data are available via web sites. Many attackers interact
with web sites. With the use of a range of tools and advanced, organized attack strategies …

Comparative Analysis of CNN and Transformers on Malicious Intent Detection in HTTP

K Tiwari, AS Bhatia, N Garg, I Arora, P Saini - International Conference on …, 2023 - Springer
The utilization of web-based applications has greatly increased in recent years. This, in turn,
has raised security concerns and data breaches leading to losses of millions of dollars. A …

[HTML][HTML] ANALYSIS OF METHODS AND MEANS FOR ENSURING CYBERSECURITY OF WEB SERVICES USING ARTIFICIAL INTELLIGENCE

DO Sverchkov, HV Fesenko - Èlektron. model, 2023 - emodel.org.ua
ABSTRACT A thorough analysis of literary sources on the application of artificial intelligence
(AI) in cyber security was carried out. During the examination, the most significant attention …

User behavior based web attack detection in the face of camouflage

MS Shin, T Kwon - Journal of the Korea Institute of Information …, 2021 - koreascience.kr
With the rapid growth in Internet users, web applications are becoming the main target of
hackers. Most previous WAFs (Web Application Firewalls) target every single HTTP request …