A closer look at intrusion detection system for web applications
N Agarwal, SZ Hussain - Security and Communication …, 2018 - Wiley Online Library
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the
web. IDS is a known methodology for detecting network‐based attacks but is still immature …
web. IDS is a known methodology for detecting network‐based attacks but is still immature …
A survey on server-side approaches to securing web applications
Web applications are one of the most prevalent platforms for information and service
delivery over the Internet today. As they are increasingly used for critical services, web …
delivery over the Internet today. As they are increasingly used for critical services, web …
Genprog: A generic method for automatic software repair
This paper describes GenProg, an automated method for repairing defects in off-the-shelf,
legacy programs without formal specifications, program annotations, or special coding …
legacy programs without formal specifications, program annotations, or special coding …
An anomaly detection method to detect web attacks using stacked auto-encoder
AM Vartouni, SS Kashi… - 2018 6th Iranian Joint …, 2018 - ieeexplore.ieee.org
Network borne attacks are currently major threats to information security. Enormous efforts
such as scanners, encryption devices, intrusion detection systems and firewalls have been …
such as scanners, encryption devices, intrusion detection systems and firewalls have been …
Zerowall: Detecting zero-day web attacks through encoder-decoder recurrent neural networks
Zero-day Web attacks are arguably the most serious threats to Web security, but are very
challenging to detect because they are not seen or known previously and thus cannot be …
challenging to detect because they are not seen or known previously and thus cannot be …
Anomaly-based web attack detection: a deep learning approach
J Liang, W Zhao, W Ye - Proceedings of the 2017 VI International …, 2017 - dl.acm.org
As the era of cloud technology arises, more and more people are beginning to migrate their
applications and personal data to the cloud. This makes web-based applications an …
applications and personal data to the cloud. This makes web-based applications an …
Comparing anomaly detection techniques for http
KL Ingham, H Inoue - Recent Advances in Intrusion Detection: 10th …, 2007 - Springer
Much data access occurs via HTTP, which is becoming a universal transport protocol.
Because of this, it has become a common exploit target and several HTTP specific IDSs …
Because of this, it has become a common exploit target and several HTTP specific IDSs …
Leveraging deep neural networks for anomaly‐based web application firewall
A Moradi Vartouni, M Teshnehlab… - IET Information …, 2019 - Wiley Online Library
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …
services on the Internet. With the launch of web 2.0, information has flourished through …
Detecting zero-day attacks using context-aware anomaly detection at the application-layer
P Duessel, C Gehl, U Flegel, S Dietrich… - International Journal of …, 2017 - Springer
Anomaly detection allows for the identification of unknown and novel attacks in network
traffic. However, current approaches for anomaly detection of network packet payloads are …
traffic. However, current approaches for anomaly detection of network packet payloads are …
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised
task. Prominent techniques, such as one-class support vector machines, learn a …
task. Prominent techniques, such as one-class support vector machines, learn a …