Contextual information fusion for intrusion detection: a survey and taxonomy

A Aleroud, G Karabatis - Knowledge and Information Systems, 2017 - Springer
Research in cyber-security has demonstrated that dealing with cyber-attacks is by no means
an easy task. One particular limitation of existing research originates from the uncertainty of …

[PDF][PDF] Data mining in intrusion detection: a comparative study of methods, types and data sets

C Azad, VK Jha - Journal of IJITCS, 2013 - researchgate.net
In the era of information and communication technology, Security is an important issue. A lot
of effort and finance are being invested in this sector. Intrusion detection is one of the most …

Clustering‐based real‐time anomaly detection—A breakthrough in big data technologies

RA Ariyaluran Habeeb, F Nasaruddin… - Transactions on …, 2022 - Wiley Online Library
Off late, the ever increasing usage of a connected Internet‐of‐Things devices has
consequently augmented the volume of real‐time network data with high velocity. At the …

Online anomaly detection using dimensionality reduction techniques for HTTP log analysis

A Juvonen, T Sipola, T Hämäläinen - Computer Networks, 2015 - Elsevier
Modern web services face an increasing number of new threats. Logs are collected from
almost all web servers, and for this reason analyzing them is beneficial when trying to …

Comparing anomaly detection techniques for http

KL Ingham, H Inoue - Recent Advances in Intrusion Detection: 10th …, 2007 - Springer
Much data access occurs via HTTP, which is becoming a universal transport protocol.
Because of this, it has become a common exploit target and several HTTP specific IDSs …

Optimal cluster based feature selection for intrusion detection system in web and cloud computing environment using hybrid teacher learning optimization enables …

KG Maheswari, C Siva, G Nalinipriya - Computer Communications, 2023 - Elsevier
Abstract Information technology organizations have experienced rapid growth in recent
years, resulting in scalability, mobility, and flexibility challenges. Those organizations move …

Anomaly detection for HTTP using convolutional autoencoders

S Park, M Kim, S Lee - IEEE Access, 2018 - ieeexplore.ieee.org
Hypertext transfer protocol (HTTP) intrusion has long been a major issue in network security.
Anomaly detection methods for detecting such intrusions have been shown to be highly …

Detection of web-based attacks through Markovian protocol parsing

JM Estevez-Tapiador, P García-Teodoro… - … IEEE symposium on …, 2005 - ieeexplore.ieee.org
This paper presents a novel approach based on the monitoring of incoming HTTP requests
to detect attacks against Web servers. The detection is accomplished through a Markovian …

Intrusion detection using MDL compression

EE Eiland, SC Evans, TS Markham… - US Patent 8,375,446, 2013 - Google Patents
This application is a continuation of US patent applica tion Ser. No. 12/260,627, filed Oct. 29,
2008, the entire dis closure of which is hereby incorporated by reference. Embodiments of …

[PDF][PDF] Cyber-Attack Penetration Test and Vulnerability Analysis.

D Stiawan, MY Idris, AH Abdullah… - … Journal of Online …, 2017 - repository.unsri.ac.id
Hacking attempts or cyber-attacks to information systems have recently evolved to be
sophisticated and deadly, resulting in such incidents as leakage of personal information and …