Chan et al., 2014 - Google Patents
Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rulesChan et al., 2014
View PDF- Document ID
- 7583404207263676907
- Author
- Chan G
- Lee C
- Heng S
- Publication year
- Publication venue
- Applied Soft Computing
External Links
Snippet
Security administrators need to prioritise which feature to focus on amidst the various possibilities and avenues of attack, especially via Web Service in e-commerce applications. This study addresses the feature selection problem by proposing a predictive fuzzy …
- 238000007637 random forest analysis 0 abstract description 28
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sarker et al. | Cybersecurity data science: an overview from machine learning perspective | |
Kaur et al. | Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review | |
Naik et al. | The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review | |
Dai et al. | A review of artificial intelligence to enhance the security of big data systems: state-of-art, methodologies, applications, and challenges | |
Demilie et al. | Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques | |
Ju et al. | Hetemsd: A big data analytics framework for targeted cyber‐attacks detection using heterogeneous multisource data | |
Chan et al. | Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks | |
Pillai et al. | Hybrid unsupervised web-attack detection and classification–A deep learning approach | |
Sangaiah et al. | Towards data security assessments using an IDS security model for cyber-physical smart cities | |
Sharma et al. | A multilayer stacking classifier based on nature-inspired optimization for detecting cross-site scripting attack | |
Chan et al. | Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules | |
Chan et al. | Policy-enhanced ANFIS model to counter SOAP-related attacks | |
Aldo Tenis et al. | Challenges and security issues of online social networks (OSN) | |
Ramya et al. | Advancing cybersecurity with explainable artificial intelligence: a review of the latest research | |
Sriramya et al. | Anomaly based detection of cross site scripting attack in web applications using gradient boosting classifier | |
Amar et al. | Weighted LSTM for intrusion detection and data mining to prevent attacks | |
Marimuthu et al. | Intelligent antiphishing framework to detect phishing scam: A hybrid classification approach | |
Rohatgi et al. | Introduction to Artificial Intelligence and Cybersecurity for Industry | |
Abdul Abiodun et al. | Performance Assessment of some Phishing predictive models based on Minimal Feature corpus | |
Ismail et al. | Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks | |
US12111926B1 (en) | Generative artificial intelligence model output obfuscation | |
Priyalakshmi et al. | Intrusion Detection Using Enhanced Transductive Support Vector Machine | |
Mishra et al. | Prediction of DDoS Attacks Using Machine Learning Algorithms Based on Classification Technique | |
Singh et al. | Modelling an Efficient Approach to Analyse Clone Phishing and Predict Cyber-Crimes | |
Khudadad et al. | Intrusion Detection with Tree-Based Data Mining Classification Techniques by Using KDD |