2014
DOI: 10.5121/ijcsea.2013.4101
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System Based on Web Usage Mining

Abstract: This artical present a system developed to find cyber threats automatically based on web usage mining methods in application layer. This system is an off-line intrusion detection system which includes different part to detect attacks and as a result helps find different kinds of attacks with different dispersals. In this study web server access logs used as the input data and after pre-processing, scanners and all identified attacks will be detected. As the next step, vectors feature from web access logs and p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…To improve the security of wireless system, I. Butun et al [16] recommended a study of the cutting edge in Intrusion Detection Systems (IDSs) that were proposed for WSNs was given IDSs along their groupings, outline details, and necessities were quickly presented. Moreover, M. Mabzool and M. Z. Lighvan [17] have clarified the Intrusion recognition framework taking into account web utilization mining. Here, web server access logs utilized as the info information and after pre-preparing, scanners and every distinguished assault were recognized.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…To improve the security of wireless system, I. Butun et al [16] recommended a study of the cutting edge in Intrusion Detection Systems (IDSs) that were proposed for WSNs was given IDSs along their groupings, outline details, and necessities were quickly presented. Moreover, M. Mabzool and M. Z. Lighvan [17] have clarified the Intrusion recognition framework taking into account web utilization mining. Here, web server access logs utilized as the info information and after pre-preparing, scanners and every distinguished assault were recognized.…”
Section: Review Of Related Workmentioning
confidence: 99%