2020 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT) 2020
DOI: 10.1109/usbereit48449.2020.9117745
|View full text |Cite
|
Sign up to set email alerts
|

Approaches to Anomaly Detection in Web Application Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Article [11] is the only one in the list found to follow a systematic review approach, it discusses the implementation of deep learning in network IDS, and does not focus on web related intrusion detection methods. Articles [12], [13], [14] are dedicated for web intrusion detection however they are neither discussing the implementation of deep learning methods, nor following a systematic approach.…”
Section: Building Interpretable and Explainable Model 1 Contributionmentioning
confidence: 99%
“…Article [11] is the only one in the list found to follow a systematic review approach, it discusses the implementation of deep learning in network IDS, and does not focus on web related intrusion detection methods. Articles [12], [13], [14] are dedicated for web intrusion detection however they are neither discussing the implementation of deep learning methods, nor following a systematic approach.…”
Section: Building Interpretable and Explainable Model 1 Contributionmentioning
confidence: 99%
“…The security of the web from various types of malicious it is needful by using anomaly detection systems. Many systems build it to secure the web, such as anomaly detection in the HTTP request parameters [59]. Simultaneously by growing internet services, the number of threats increased [60].…”
Section: Ids For Web Applicationsmentioning
confidence: 99%
“…A BAD-based security solution could be relevant for multiple cyber systems and environments such as web applications and databases [31]. In particular, it is meant to deal with multiple security threats such as malicious insider and compromised user account.…”
Section: Existing Behavioral Anomaly Detection-based Security Approachesmentioning
confidence: 99%