Intrusion detection systems: A state-of-the-art taxonomy and survey

M Alkasassbeh, S Al-Haj Baddar - Arabian Journal for Science and …, 2023 - Springer
Abstract Intrusion Detection Systems (IDSs) have become essential to the sound operations
of networks. These systems have the potential to identify and report deviations from normal …

A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges

JE Díaz-Verdejo, RE Alonso, AE Alonso… - Computers & …, 2023 - Elsevier
Abstract Intrusion Detection Systems (IDSs) and Web Application Firewalls (WAFs) offer a
crucial layer of defense that allows organizations to detect cyberattacks on their web servers …

GeneMiner: a classification approach for detection of XSS attacks on web services

C Gupta, RK Singh… - Computational Intelligence …, 2022 - Wiley Online Library
According to OWASP 2021, cross‐site scripting (XSS) attacks are increasing through
specially crafted XML documents. The attacker injects a malicious payload with a new …

A four-dimensional space-based data multi-embedding mechanism for network services

M Li, H Cui, C Liu, C Shan, X Du… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In the age of data science and connected devices of all kinds, users have gained a lot of
convenience. However, the massive data generated by users from the communication …

Prevention and fighting against web attacks through anomaly detection technology. A systematic review

T Sureda Riera, JR Bermejo Higuera… - Sustainability, 2020 - mdpi.com
Numerous techniques have been developed in order to prevent attacks on web servers.
Anomaly detection techniques are based on models of normal user and application …

[PDF][PDF] Prevention and fighting against web attacks through anomaly detection technology. A systematic review

TS Riera, JRB Higuera, JB Higuera, JJM Herraiz… - …, 2020 - researchgate.net
Numerous techniques have been developed in order to prevent attacks on web servers.
Anomaly detection techniques are based on models of normal user and application …

[PDF][PDF] Exploring Text Mining and Analytics for Applications in Public Security: An in-depth dive into a systematic literature review

VDH De Carvalho, A Costa - Socioecon. Anal, 2023 - periodicos.ufpe.br
Text mining and related analytics emerge as a technological approach to support human
activities in extracting useful knowledge through texts in several formats. From a managerial …

Design challenges and assessment of modern web applications intrusion detection and prevention systems (IDPS)

Y Sadqi, M Mekkaoui - Innovations in Smart Cities Applications Volume 4 …, 2021 - Springer
Intrusion detection and prevention systems (IDPS) are primarily designed to observe, detect
and prevent malicious activity on the network. However, the characteristics of traditional …

A precise bare simulation approach to the minimization of some distances. II. Further Foundations

M Broniatowski, W Stummer - arXiv preprint arXiv:2402.08478, 2024 - arxiv.org
The constrained minimization (respectively maximization) of directed distances and of
related generalized entropies is a fundamental task in information theory as well as in the …

Web services security and threats: A systematic literature review

EA Setyawan, F Hidayat - … Conference on ICT for Smart Society …, 2020 - ieeexplore.ieee.org
Privacy and data protection issues are the main problems in using web services to transmit
data. Three aspects of information security that contains confidentiality, integrity, and …