A closer look at intrusion detection system for web applications

N Agarwal, SZ Hussain - Security and Communication …, 2018 - Wiley Online Library
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the
web. IDS is a known methodology for detecting network‐based attacks but is still immature …

A survey on server-side approaches to securing web applications

X Li, Y Xue - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Web applications are one of the most prevalent platforms for information and service
delivery over the Internet today. As they are increasingly used for critical services, web …

Genprog: A generic method for automatic software repair

C Le Goues, TV Nguyen, S Forrest… - Ieee transactions on …, 2011 - ieeexplore.ieee.org
This paper describes GenProg, an automated method for repairing defects in off-the-shelf,
legacy programs without formal specifications, program annotations, or special coding …

An anomaly detection method to detect web attacks using stacked auto-encoder

AM Vartouni, SS Kashi… - 2018 6th Iranian Joint …, 2018 - ieeexplore.ieee.org
Network borne attacks are currently major threats to information security. Enormous efforts
such as scanners, encryption devices, intrusion detection systems and firewalls have been …

Zerowall: Detecting zero-day web attacks through encoder-decoder recurrent neural networks

R Tang, Z Yang, Z Li, W Meng, H Wang… - … -IEEE Conference on …, 2020 - ieeexplore.ieee.org
Zero-day Web attacks are arguably the most serious threats to Web security, but are very
challenging to detect because they are not seen or known previously and thus cannot be …

Anomaly-based web attack detection: a deep learning approach

J Liang, W Zhao, W Ye - Proceedings of the 2017 VI International …, 2017 - dl.acm.org
As the era of cloud technology arises, more and more people are beginning to migrate their
applications and personal data to the cloud. This makes web-based applications an …

Comparing anomaly detection techniques for http

KL Ingham, H Inoue - Recent Advances in Intrusion Detection: 10th …, 2007 - Springer
Much data access occurs via HTTP, which is becoming a universal transport protocol.
Because of this, it has become a common exploit target and several HTTP specific IDSs …

Leveraging deep neural networks for anomaly‐based web application firewall

A Moradi Vartouni, M Teshnehlab… - IET Information …, 2019 - Wiley Online Library
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …

Detecting zero-day attacks using context-aware anomaly detection at the application-layer

P Duessel, C Gehl, U Flegel, S Dietrich… - International Journal of …, 2017 - Springer
Anomaly detection allows for the identification of unknown and novel attacks in network
traffic. However, current approaches for anomaly detection of network packet payloads are …

Active learning for network intrusion detection

N Görnitz, M Kloft, K Rieck, U Brefeld - … of the 2nd ACM workshop on …, 2009 - dl.acm.org
Anomaly detection for network intrusion detection is usually considered an unsupervised
task. Prominent techniques, such as one-class support vector machines, learn a …