The weighted word2vec paragraph vectors for anomaly detection over HTTP traffic
Anomaly detection over HTTP traffic has attracted much attention in recent years, which
plays a vital role in many domains. This article proposes an efficient machine learning …
plays a vital role in many domains. This article proposes an efficient machine learning …
Deep anomaly detection in packet payload
With the wide deployment of edge devices, a variety of emerging applications have been
deployed at the edge of network. To guarantee the safe and efficient operations of the edge …
deployed at the edge of network. To guarantee the safe and efficient operations of the edge …
Attentional payload anomaly detector for web applications
ZQ Qin, XK Ma, YJ Wang - … 2018, Siem Reap, Cambodia, December 13-16 …, 2018 - Springer
Nowadays web applications influence people deeply and become popular targets of
attackers. The payload anomaly detection is an effective method to keep the security of web …
attackers. The payload anomaly detection is an effective method to keep the security of web …
Detecting malicious web requests using an enhanced textcnn
L Yu, L Chen, J Dong, M Li, L Liu… - 2020 IEEE 44th …, 2020 - ieeexplore.ieee.org
This paper proposes an approach that combines a deep learning-based method and a
traditional machine learning-based method to efficiently detect malicious requests Web …
traditional machine learning-based method to efficiently detect malicious requests Web …
Software defined security architecture with deep learning-based network anomaly detection module
G Zhang, X Qiu, Y Gao - 2019 IEEE 11th International …, 2019 - ieeexplore.ieee.org
With the development of the Internet, the network attack technology has undergone
tremendous changes. The forms of network attack and defense have also changed, which …
tremendous changes. The forms of network attack and defense have also changed, which …
ADSAD: An unsupervised attention-based discrete sequence anomaly detection framework for network security analysis
ZQ Qin, XK Ma, YJ Wang - Computers & Security, 2020 - Elsevier
Detecting anomalous discrete sequences such as payloads and syscall traces is a crucial
task of network security analysis for discovering novel attacks. The data characteristics that …
task of network security analysis for discovering novel attacks. The data characteristics that …
Data analytics methods for anomaly detection: Evolution and recommendations
IIMA Sulayman, A Ouda - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
Big Data-based applications have been increased especially those which utilize anomaly
detection techniques. This paper puts a new insight into the anomaly detection techniques …
detection techniques. This paper puts a new insight into the anomaly detection techniques …
[PDF][PDF] A Novel Anomaly Detection Approach to Secure APIs from Cyberattacks
A Ifthikar, N Thennakoon, S Malalgoda, HK Moraliyage… - 2022 - opal.latrobe.edu.au
Digital transformation driven rapid movement towards the digital economy resulted in an
elevated amount of cyber risks and cyber threats for nations. In this feat, RESTful Application …
elevated amount of cyber risks and cyber threats for nations. In this feat, RESTful Application …
Anomaly Behavior Detection for the Web Application Based on LSTM
H Ma, C Wang, H Qi - 2021 IEEE Conference on …, 2021 - ieeexplore.ieee.org
With the development of the Internet, more and more services are provided through various
web applications. At the same time, the number of malicious behaviors of illegal access to …
web applications. At the same time, the number of malicious behaviors of illegal access to …
LIDS: An Extended LSTM Based Web Intrusion Detection System With Active and Distributed Learning
AT Sagayam - 2021 - vtechworks.lib.vt.edu
Intrusion detection systems are an integral part of web application security. As Internet use
continues to increase, the demand for fast, accurate intrusion detection systems has grown …
continues to increase, the demand for fast, accurate intrusion detection systems has grown …