Data preprocessing for anomaly based network intrusion detection: A review

JJ Davis, AJ Clark - computers & security, 2011 - Elsevier
Data preprocessing is widely recognized as an important stage in anomaly detection. This
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …

Modeling and defense of social virtual reality attacks inducing cybersickness

S Valluripally, A Gulhane, KA Hoque… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Social Virtual Reality Learning Environments (VRLE) offer a new medium for flexible and
immersive learning environments with geo-distributed users. Ensuring user safety in VRLE …

idMAS-SQL: intrusion detection based on MAS to detect and block SQL injection through data mining

CI Pinzon, JF De Paz, A Herrero, E Corchado, J Bajo… - Information …, 2013 - Elsevier
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which
are one of the most prevalent threats for modern databases. The proposed architecture is …

Attack trees for security and privacy in social virtual reality learning environments

S Valluripally, A Gulhane, R Mitra… - 2020 IEEE 17th …, 2020 - ieeexplore.ieee.org
Social Virtual Reality Learning Environment (VRLE) is a novel edge computing platform for
collaboration amongst distributed users. Given that VRLEs are used for critical applications …

An analysis of DDoS attacks in a smart home networks

U Saxena, JS Sodhi, Y Singh - 2020 10th International …, 2020 - ieeexplore.ieee.org
A Distributed Denial of Service (DDoS) attack is an attack which compromised the
bandwidth of the whole network by choking down all the available network resources which …

SQL injection attacks-a systematic review

K Sharma, S Bhatt - International journal of information and …, 2019 - inderscienceonline.com
In today's era, each and every person is utilising websites and so many different web
applications for online administrations, for example: booking of railway tickets, movie …

Web application security tools analysis

A Alzahrani, A Alqazzaz, Y Zhu, H Fu… - 2017 ieee 3rd …, 2017 - ieeexplore.ieee.org
Strong security in web applications is critical to the success of your online presence. Security
importance has grown massively, especially among web applications. Dealing with web …

Automatically repairing web application firewalls based on successful SQL injection attacks

D Appelt, A Panichella, L Briand - 2017 IEEE 28th international …, 2017 - ieeexplore.ieee.org
Testing and fixing Web Application Firewalls (WAFs) are two relevant and complementary
challenges for security analysts. Automated testing helps to cost-effectively detect …

[PDF][PDF] A survey on the detection of SQL injection attacks and their countermeasures

B Nagpal, N Chauhan, N Singh - Journal of Information Processing …, 2017 - koreascience.kr
Abstract The Structured Query Language (SQL) Injection continues to be one of greatest
security risks in the world according to the Open Web Application Security Project's …

Combinatorial approach for preventing SQL injection attacks

R Ezumalai, G Aghila - 2009 IEEE International Advance …, 2009 - ieeexplore.ieee.org
A combinatorial approach for protecting Web applications against SQL injection is discussed
in this paper, which is a novel idea of incorporating the uniqueness of signature based …