Machine learning techniques applied to detect cyber attacks on web applications

[1]  Mrinal Kanti Ghose,et al.  A Framework for P2P Botnet Detection Using SVM , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[2]  Lukasz Saganowski,et al.  Statistical and signal‐based network traffic recognition for anomaly detection , 2012, Expert Syst. J. Knowl. Eng..

[3]  Manish Sharma,et al.  Pre-clustering algorithm for anomaly detection and clustering that uses variable size buckets , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).

[4]  Philippe Owezarski,et al.  Sub-Space clustering, Inter-Clustering Results Association & anomaly correlation for unsupervised network anomaly detection , 2011, 2011 7th International Conference on Network and Service Management.

[5]  Gonzalo Álvarez,et al.  Application of the Generic Feature Selection Measure in Detection of Web Attacks , 2011, CISIS.

[6]  Hongsheng Xi,et al.  SAS: semantics aware signature generation for polymorphic worm detection , 2010, International Journal of Information Security.

[7]  Jun Ma,et al.  Network Anomaly Detection Using Dissimilarity-Based One-Class SVM Classifier , 2009, 2009 International Conference on Parallel Processing Workshops.

[8]  Shunzheng Yu,et al.  A Novel Model for Detecting Application Layer DDoS Attacks , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[9]  Michael Rohs,et al.  BYOD: bring your own device , 2004 .

[10]  Daniel P. Huttenlocher,et al.  Efficient Graph-Based Image Segmentation , 2004, International Journal of Computer Vision.

[11]  Dan Schnackenberg,et al.  Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[12]  Yiguo Qiao,et al.  Anomaly intrusion detection method based on HMM , 2002 .

[13]  S. B. Needleman,et al.  A general method applicable to the search for similarities in the amino acid sequence of two proteins. , 1970, Journal of molecular biology.

[14]  Ashok Kumar,et al.  Neural Networks for Fast Estimation of Social Network Centrality Measures , 2015 .

[15]  Bartosz Krawczyk,et al.  Combined Classifiers with Neural Fuser for Spam Detection , 2012, CISIS/ICEUTE/SOCO Special Sessions.

[16]  Michal Choras,et al.  Correlation Approach for SQL Injection Attacks Detection , 2012, CISIS/ICEUTE/SOCO Special Sessions.

[17]  Krzysztof A. Cyran,et al.  Advances in Intelligent and Soft Computing , 2009 .

[18]  Wei Li,et al.  Using Genetic Algorithm for Network Intrusion Detection , 2004 .

[19]  Zheng Zhang,et al.  HIDE : a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .