The weighted word2vec paragraph vectors for anomaly detection over HTTP traffic

J Li, H Zhang, Z Wei - IEEE Access, 2020 - ieeexplore.ieee.org
Anomaly detection over HTTP traffic has attracted much attention in recent years, which
plays a vital role in many domains. This article proposes an efficient machine learning …

Deep anomaly detection in packet payload

J Liu, X Song, Y Zhou, X Peng, Y Zhang, P Liu, D Wu… - Neurocomputing, 2022 - Elsevier
With the wide deployment of edge devices, a variety of emerging applications have been
deployed at the edge of network. To guarantee the safe and efficient operations of the edge …

Attentional payload anomaly detector for web applications

ZQ Qin, XK Ma, YJ Wang - … 2018, Siem Reap, Cambodia, December 13-16 …, 2018 - Springer
Nowadays web applications influence people deeply and become popular targets of
attackers. The payload anomaly detection is an effective method to keep the security of web …

Detecting malicious web requests using an enhanced textcnn

L Yu, L Chen, J Dong, M Li, L Liu… - 2020 IEEE 44th …, 2020 - ieeexplore.ieee.org
This paper proposes an approach that combines a deep learning-based method and a
traditional machine learning-based method to efficiently detect malicious requests Web …

Software defined security architecture with deep learning-based network anomaly detection module

G Zhang, X Qiu, Y Gao - 2019 IEEE 11th International …, 2019 - ieeexplore.ieee.org
With the development of the Internet, the network attack technology has undergone
tremendous changes. The forms of network attack and defense have also changed, which …

ADSAD: An unsupervised attention-based discrete sequence anomaly detection framework for network security analysis

ZQ Qin, XK Ma, YJ Wang - Computers & Security, 2020 - Elsevier
Detecting anomalous discrete sequences such as payloads and syscall traces is a crucial
task of network security analysis for discovering novel attacks. The data characteristics that …

Data analytics methods for anomaly detection: Evolution and recommendations

IIMA Sulayman, A Ouda - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
Big Data-based applications have been increased especially those which utilize anomaly
detection techniques. This paper puts a new insight into the anomaly detection techniques …

[PDF][PDF] A Novel Anomaly Detection Approach to Secure APIs from Cyberattacks

A Ifthikar, N Thennakoon, S Malalgoda, HK Moraliyage… - 2022 - opal.latrobe.edu.au
Digital transformation driven rapid movement towards the digital economy resulted in an
elevated amount of cyber risks and cyber threats for nations. In this feat, RESTful Application …

Anomaly Behavior Detection for the Web Application Based on LSTM

H Ma, C Wang, H Qi - 2021 IEEE Conference on …, 2021 - ieeexplore.ieee.org
With the development of the Internet, more and more services are provided through various
web applications. At the same time, the number of malicious behaviors of illegal access to …

LIDS: An Extended LSTM Based Web Intrusion Detection System With Active and Distributed Learning

AT Sagayam - 2021 - vtechworks.lib.vt.edu
Intrusion detection systems are an integral part of web application security. As Internet use
continues to increase, the demand for fast, accurate intrusion detection systems has grown …