The International Conference on Information Networking 2014 (ICOIN2014) 2014
DOI: 10.1109/icoin.2014.6799699
|View full text |Cite
|
Sign up to set email alerts
|

Web attack detection using entropy-based analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0
2

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 9 publications
0
9
0
2
Order By: Relevance
“…Compared with Markov model, naive Bayes not only can achieve a desirable performance but also can finish in a short running time. Inspired by the methods from and , the details are introduced in the succeeding paragraphs. Split all string data t into tokens [ t 1 , t 2 ,…, t k ] by using delimiters or marks (i.e.…”
Section: A Multi‐layers Anomaly Detection Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…Compared with Markov model, naive Bayes not only can achieve a desirable performance but also can finish in a short running time. Inspired by the methods from and , the details are introduced in the succeeding paragraphs. Split all string data t into tokens [ t 1 , t 2 ,…, t k ] by using delimiters or marks (i.e.…”
Section: A Multi‐layers Anomaly Detection Frameworkmentioning
confidence: 99%
“…Because a string can be seen as a text, string data also can be evaluated by entropy . To achieve simplification and normalization, we utilize the same splitting methods as stated earlier, and the relative entropy learned from is defined as the final value. Et=1λi=1Npi[log(λ)log(pi)] Emax=1λi=1N1×[log(λ)log(1)]=log(λ) Erel=EtEmax×100 where λ and N show that λ words with N distinct ones, and p i is the number of times that the i t h word appears.…”
Section: A Multi‐layers Anomaly Detection Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…A lot of research work regarding web logging and parameter inspection can be found in the literature [14], [15], [16], [17]. Investigation of anomalous activity in HTTP requests and the parameters used to pass values to server-side programs were performed in [18].…”
Section: A Related Workmentioning
confidence: 99%
“…The research proposed in [41] assumed that the attack patterns commonly have a level of complexity that exceeds normal access requests. This complexity is used as a benchmark in detecting attacks.…”
Section: Attack On Webmentioning
confidence: 99%