[HTML][HTML] Detection of attack-targeted scans from the Apache HTTP Server access logs

MB Seyyar, FÖ Çatak, E Gül - Applied computing and informatics, 2018 - Elsevier
A web application could be visited for different purposes. It is possible for a web site to be
visited by a regular user as a normal (natural) visit, to be viewed by crawlers, bots, spiders …

Multi-criteria analysis and prediction of network incidents using monitoring system

L Macura, M Voznak - Journal of Advanced Engineering and Computation, 2017 - jaec.vn
Today, network technologies can handle throughputs up to 100Gbps, transporting 200
million packets per second on a single link. Such high bandwidths impact network flow …

[PDF][PDF] Building a robust client-side protection against cross site request forgery

A AlAmeen - International Journal of Advanced Computer Science …, 2015 - Citeseer
In recent years, the web has been an indispensable part of business all over the world and
web browsers have become the backbones of today's systems and applications …

Applied Computing and Informatics

H Aboalsamh, AM Al-Dhelaan… - King Saud …, 2015 - cntttest.vanlanguni.edu.vn
This paper proposes and evaluates the novel utilization of small world network properties for
the formation of team of players with both best performances and best belongingness within …

[HTML][HTML] Employing monitoring system to analyze incidents in computer network

L Macura, J Rozhon, JCW Lin - … of the 3rd Czech-China Scientific …, 2017 - intechopen.com
Today, network technologies can handle throughputs or up to 100 Gbps, transporting 200
million packets per second on a single link. Such high bandwidths impact network flow …

Intrusion Detection and Avoidance for a Heterogeneous Cluster of Web Sites

D Ramsook, P Hosein, A Pooransingh - International Conference on …, 2019 - Springer
This paper outlines the design of a Hybrid Intrusion Detection System for a Web-Server
hosting a heterogeneous cluster of web sites. This system was trained using the …

Security Incident Detection Using Multidimensional Analysis of the Web Server Log Files

G Kołaczek, T Kuzemko - … 6th International Conference, ICCCI 2014, Seoul …, 2014 - Springer
The paper presents the results of the research related to security analysis of web servers.
The presented method uses the web server log files to determine the type of the attack …

[PDF][PDF] Detection and Implementation of Web-based Attacks using Attribute Length Method

S Agrawal, P Gupta, V Jain, A Jain - International Journal of …, 2015 - researchgate.net
With the increasing demand of web-based applications, they have become more prone to be
exploited by the attackers. The purpose of this paper is to study the effects of web-based …

Ανίχνευση και πρόληψη επιθέσεων άρνησης εξυπηρέτησης στα πρωτόκολλα SIP και SDP

Ζ Τσιάτσικας - 2019 - hellanicus.lib.aegean.gr
Οι πολυμεσικές υπηρεσίες που παρέχονται μέσω του Διαδικτύου, και συγκεκριμένα αυτές που
αξιοποιούν το πρωτόκολλο SIP για τη διαχείριση της σηματοδοσίας, συνεχίζουν να …

[PDF][PDF] Applied Computing and Informatics

MB Seyyar, FÖ Çatak, E Gül - 2017 - core.ac.uk
abstract A web application could be visited for different purposes. It is possible for a web site
to be visited by a regular user as a normal (natural) visit, to be viewed by crawlers, bots …