Signature-based and machine-learning-based web application firewalls: a short survey
Abstract Web Application Firewalls (WAF) have evolved to protect web applications from
attack. A signature-based WAF responds to threats through the implementation of …
attack. A signature-based WAF responds to threats through the implementation of …
Deep learning technique-enabled web application firewall for the detection of web attacks
BR Dawadi, B Adhikari, DK Srivastava - Sensors, 2023 - mdpi.com
New techniques and tactics are being used to gain unauthorized access to the web that
harm, steal, and destroy information. Protecting the system from many threats such as DDoS …
harm, steal, and destroy information. Protecting the system from many threats such as DDoS …
Securing web applications against XSS and SQLi attacks using a novel deep learning approach
Modern web application development involves handling enormous amounts of sensitive and
consequential data. Security is, therefore, a crucial component of developing web …
consequential data. Security is, therefore, a crucial component of developing web …
Web application firewall based on anomaly detection using deep learning
S Toprak, AG Yavuz - Acta Infologica, 2022 - dergipark.org.tr
Anomaly detection has been researched in different areas and application domains. The
main difficulty is to identify the outliers from the normals in case of encountering an input that …
main difficulty is to identify the outliers from the normals in case of encountering an input that …
A classification-by-retrieval framework for few-shot anomaly detection to detect API injection
Abstract Application Programming Interface (API) Injection attacks refer to the unauthorized
or malicious use of APIs, which are often exploited to gain access to sensitive data or …
or malicious use of APIs, which are often exploited to gain access to sensitive data or …
Few-Shot API Attack Anomaly Detection in a Classification-by-Retrieval Framework
Application Programming Interface (API) attacks refer to the unauthorized or malicious use of
APIs, which are often exploited to gain access to sensitive data or manipulate online …
APIs, which are often exploited to gain access to sensitive data or manipulate online …
Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewall
Abstract Web Application Firewall (WAF) is known as one of the Intrusion Detection System
(IDS) solutions for protecting web servers from HTTP attacks. WAF is a tool to identify and …
(IDS) solutions for protecting web servers from HTTP attacks. WAF is a tool to identify and …
Auto-threshold deep SVDD for anomaly-based web application firewall
Protecting websites and applications from cyber-threats is vital for any organization. A Web
application firewall (WAF) prevents attacks to damaging applications. This provides a web …
application firewall (WAF) prevents attacks to damaging applications. This provides a web …
Genetic fuzzy rules and hybrid QDCNN-F-DSAE for detecting attacker behavior with tuning of firewall
T Lalitha Kumari, A Ramesh Babu - Australian Journal of Electrical …, 2024 - Taylor & Francis
The application of computer technology is increasing quickly as the field of information
technology develops over time. Because of the growth of computer networks, there is a rise …
technology develops over time. Because of the growth of computer networks, there is a rise …
W2R: An ensemble anomaly detection model inspired by language models for web application firewalls security
Z Wang, A AnilKumar - 2023 - diva-portal.org
Nowadays, web application attacks have increased tremendously due to the large number
of users and applications. Thus, industries are paying more attention to using Web …
of users and applications. Thus, industries are paying more attention to using Web …