Anomaly-based network intrusion detection: Techniques, systems and challenges

P Garcia-Teodoro, J Diaz-Verdejo… - computers & …, 2009 - Elsevier
The Internet and computer networks are exposed to an increasing number of security
threats. With new types of attacks appearing continually, developing flexible and adaptive …

Behavioral profiling method and system to authenticate a user

K Moritz, SS Aultman, JJA Campbell, D Casillas… - US Patent …, 2015 - Google Patents
Variations between the behavioral characteristics of the user interactions observed during
the current session and a behav ioral profile previously developed based on prior usage pat …

[图书][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …

A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges

JE Díaz-Verdejo, RE Alonso, AE Alonso… - Computers & …, 2023 - Elsevier
Abstract Intrusion Detection Systems (IDSs) and Web Application Firewalls (WAFs) offer a
crucial layer of defense that allows organizations to detect cyberattacks on their web servers …

Enabling agile testing through continuous integration

S Stolberg - 2009 agile conference, 2009 - ieeexplore.ieee.org
A continuous integration system is often considered one of the key elements involved in
supporting an agile software development and testing environment. As a traditional software …

Detection of HTTP-GET flood attack based on analysis of page access behavior

T Yatagai, T Isohara, I Sasase - 2007 IEEE Pacific rim …, 2007 - ieeexplore.ieee.org
Recently, there are many denial-of-service (DoS) attacks by computer viruses or botnet. DoS
attacks to Web services are called HTTP-GET flood attack and threats of them increase day …

Leveraging deep neural networks for anomaly‐based web application firewall

A Moradi Vartouni, M Teshnehlab… - IET Information …, 2019 - Wiley Online Library
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …

Sophisticated denial of service attacks aimed at application layer

V Durcekova, L Schwartz, N Shahmehri - 2012 ELEKTRO, 2012 - ieeexplore.ieee.org
Popularity of application services offered by Internet has grown a lot in recent years.
Basically, Internet was built with the focus on its functionality and not with the focus on the …

User behavior anomaly detection for application layer ddos attacks

MM Najafabadi, TM Khoshgoftaar… - … and Integration (IRI), 2017 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are a popular and inexpensive form of cyber
attacks. Application layer DDoS attacks utilize legitimate application layer requests to …

Adaptive network intrusion detection system using a hybrid approach

RR Karthick, VP Hattiwale… - 2012 Fourth International …, 2012 - ieeexplore.ieee.org
Any activity aimed at disrupting a service or making a resource unavailable or gaining
unauthorized access can be termed as an intrusion. Examples include buffer overflow …