Anomaly-based network intrusion detection: Techniques, systems and challenges
P Garcia-Teodoro, J Diaz-Verdejo… - computers & …, 2009 - Elsevier
The Internet and computer networks are exposed to an increasing number of security
threats. With new types of attacks appearing continually, developing flexible and adaptive …
threats. With new types of attacks appearing continually, developing flexible and adaptive …
Behavioral profiling method and system to authenticate a user
K Moritz, SS Aultman, JJA Campbell, D Casillas… - US Patent …, 2015 - Google Patents
Variations between the behavioral characteristics of the user interactions observed during
the current session and a behav ioral profile previously developed based on prior usage pat …
the current session and a behav ioral profile previously developed based on prior usage pat …
[图书][B] Network anomaly detection: A machine learning perspective
DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …
accompanying growth in the number of network attacks, network intrusion detection has …
A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges
JE Díaz-Verdejo, RE Alonso, AE Alonso… - Computers & …, 2023 - Elsevier
Abstract Intrusion Detection Systems (IDSs) and Web Application Firewalls (WAFs) offer a
crucial layer of defense that allows organizations to detect cyberattacks on their web servers …
crucial layer of defense that allows organizations to detect cyberattacks on their web servers …
Enabling agile testing through continuous integration
S Stolberg - 2009 agile conference, 2009 - ieeexplore.ieee.org
A continuous integration system is often considered one of the key elements involved in
supporting an agile software development and testing environment. As a traditional software …
supporting an agile software development and testing environment. As a traditional software …
Detection of HTTP-GET flood attack based on analysis of page access behavior
T Yatagai, T Isohara, I Sasase - 2007 IEEE Pacific rim …, 2007 - ieeexplore.ieee.org
Recently, there are many denial-of-service (DoS) attacks by computer viruses or botnet. DoS
attacks to Web services are called HTTP-GET flood attack and threats of them increase day …
attacks to Web services are called HTTP-GET flood attack and threats of them increase day …
Leveraging deep neural networks for anomaly‐based web application firewall
A Moradi Vartouni, M Teshnehlab… - IET Information …, 2019 - Wiley Online Library
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …
services on the Internet. With the launch of web 2.0, information has flourished through …
Sophisticated denial of service attacks aimed at application layer
V Durcekova, L Schwartz, N Shahmehri - 2012 ELEKTRO, 2012 - ieeexplore.ieee.org
Popularity of application services offered by Internet has grown a lot in recent years.
Basically, Internet was built with the focus on its functionality and not with the focus on the …
Basically, Internet was built with the focus on its functionality and not with the focus on the …
User behavior anomaly detection for application layer ddos attacks
MM Najafabadi, TM Khoshgoftaar… - … and Integration (IRI), 2017 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are a popular and inexpensive form of cyber
attacks. Application layer DDoS attacks utilize legitimate application layer requests to …
attacks. Application layer DDoS attacks utilize legitimate application layer requests to …
Adaptive network intrusion detection system using a hybrid approach
RR Karthick, VP Hattiwale… - 2012 Fourth International …, 2012 - ieeexplore.ieee.org
Any activity aimed at disrupting a service or making a resource unavailable or gaining
unauthorized access can be termed as an intrusion. Examples include buffer overflow …
unauthorized access can be termed as an intrusion. Examples include buffer overflow …