2013
DOI: 10.1007/978-3-642-40316-3_33
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…When a new attack occurs, the new rules correspond to the map units will be updated instead of updating the entire model in the fuzzy rule base. Zolotukhin et al proposed a method for the identification of benign or malicious requests using n-gram analysis and through statistical methods [21]. This method takes more computational time since the size of the feature is large.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…When a new attack occurs, the new rules correspond to the map units will be updated instead of updating the entire model in the fuzzy rule base. Zolotukhin et al proposed a method for the identification of benign or malicious requests using n-gram analysis and through statistical methods [21]. This method takes more computational time since the size of the feature is large.…”
Section: Related Workmentioning
confidence: 99%
“…This method takes more computational time since the size of the feature is large. Bhuyan et al proposed a method to distinguish the low rate and high rate malicious traffic from benign traffic using information theory with low computational overhead [21].…”
Section: Related Workmentioning
confidence: 99%