[HTML][HTML] Detection of attack-targeted scans from the Apache HTTP Server access logs

MB Seyyar, FÖ Çatak, E Gül - Applied computing and informatics, 2018 - Elsevier
A web application could be visited for different purposes. It is possible for a web site to be
visited by a regular user as a normal (natural) visit, to be viewed by crawlers, bots, spiders …

An anomaly detection method to detect web attacks using stacked auto-encoder

AM Vartouni, SS Kashi… - 2018 6th Iranian Joint …, 2018 - ieeexplore.ieee.org
Network borne attacks are currently major threats to information security. Enormous efforts
such as scanners, encryption devices, intrusion detection systems and firewalls have been …

Clustering‐based real‐time anomaly detection—A breakthrough in big data technologies

RA Ariyaluran Habeeb, F Nasaruddin… - Transactions on …, 2022 - Wiley Online Library
Off late, the ever increasing usage of a connected Internet‐of‐Things devices has
consequently augmented the volume of real‐time network data with high velocity. At the …

Detecting web attacks with end-to-end deep learning

Y Pan, F Sun, Z Teng, J White, DC Schmidt… - Journal of Internet …, 2019 - Springer
Web applications are popular targets for cyber-attacks because they are network-accessible
and often contain vulnerabilities. An intrusion detection system monitors web applications …

A deep learning method to detect web attacks using a specially designed CNN

M Zhang, B Xu, S Bai, S Lu, Z Lin - … 14–18, 2017, Proceedings, Part V 24, 2017 - Springer
With the increasing information sharing and other activities conducted on the World Wide
Web, the Web has become the main venue for attackers to make troubles. The effective …

Prevention and fighting against web attacks through anomaly detection technology. A systematic review

T Sureda Riera, JR Bermejo Higuera… - Sustainability, 2020 - mdpi.com
Numerous techniques have been developed in order to prevent attacks on web servers.
Anomaly detection techniques are based on models of normal user and application …

Detecting web attacks using multi-stage log analysis

M Moh, S Pininti, S Doddapaneni… - 2016 IEEE 6th …, 2016 - ieeexplore.ieee.org
Web-based applications have gained universal acceptance in every sector of lives,
including social, commercial, government, and academic communities. Even with the recent …

Leveraging deep neural networks for anomaly‐based web application firewall

A Moradi Vartouni, M Teshnehlab… - IET Information …, 2019 - Wiley Online Library
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …

DeepWAF: detecting web attacks based on CNN and LSTM models

X Kuang, M Zhang, H Li, G Zhao, H Cao, Z Wu… - Cyberspace Safety and …, 2019 - Springer
The increasing popularity of web applications makes the web a main venue for attackers
engaging in a myriad of cybercrimes. With large quantities of information processing and …

Machine learning to detect anomalies in web log analysis

Q Cao, Y Qiao, Z Lyu - 2017 3rd IEEE international conference …, 2017 - ieeexplore.ieee.org
As the information technology develops rapidly, Web servers are easily to be attacked
because of their high value. Therefore, Web security has aroused great concern in both …