{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:51:31Z","timestamp":1742957491817,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030199449"},{"type":"electronic","value":"9783030199456"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19945-6_6","type":"book-chapter","created":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T11:53:20Z","timestamp":1557489200000},"page":"79-97","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Advanced Hybrid Technique in Detecting Cloud Web Application\u2019s Attacks"],"prefix":"10.1007","author":[{"given":"Meryem","family":"Amar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mouad","family":"Lemoudden","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bouabid","family":"El Ouahidi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,5,10]]},"reference":[{"key":"6_CR1","unstructured":"Stats, I.W.: World Internet Users Statistics and 2018 World Population Stats (2018). [En ligne]. https:\/\/www.internetworldstats.com\/stats.htm"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M Ali","year":"2015","unstructured":"Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357\u2013383 (2015)","journal-title":"Inf. Sci."},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/j.procs.2017.06.124","volume":"110","author":"G Ramachandra","year":"2017","unstructured":"Ramachandra, G., Iftikhar, M., Aslam Khan, F.: A comprehensive survey on security in cloud computing. Procedia Comput. Sci. 110, 467\u2013472 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"6_CR5","unstructured":"Passi, H.: OWASP - Top 10 Vulnerabilities in web applications (updated for 2018 \u2026), 2 January 2018. [En ligne]. https:\/\/www.greycampus.com\/blog\/information-security\/owasp-top-vulnerabilities-in-web-applications"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Shah, J.: Understanding and study of intrusion detection systems for various networks and domains. In: Computer Communication and Informatics (ICCCI) (2017)","DOI":"10.1109\/ICCCI.2017.8117726"},{"key":"6_CR7","unstructured":"Indraneel, S., Praveen, V., Vuppala, K.: HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm. Appl. Comput. Inform. (2017)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1016\/j.neucom.2017.06.037","volume":"267","author":"S Moshfeq Salaken","year":"2017","unstructured":"Moshfeq Salaken, S., Khosravi, A., Nguyen, T., Nahavandi, S.: Extreme learning machine based transfer learning algorithms: a survey. Neurocomputing 267, 516\u2013524 (2017)","journal-title":"Neurocomputing"},{"key":"6_CR9","first-page":"205","volume":"9","author":"Y Li","year":"2015","unstructured":"Li, Y., Ma, R., Jiao, R.: A hybrid malicious code detection method based on deep learning. Int. J. Secur. Appl. 9, 205\u2013216 (2015)","journal-title":"Int. J. Secur. Appl."},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2017","unstructured":"Diro, A.A., Chilamkurti, N.: Distributed Attack Detection Scheme Using Deep Learning approach for Internet of Things. Future Generation Computer Systems 82, 761\u2013768 (2017)","journal-title":"Future Generation Computer Systems"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1016\/j.procs.2016.04.253","volume":"83","author":"M Lemoudden","year":"2016","unstructured":"Lemoudden, M., Amar, M., El Ouahidi, B.: A binary-based MapReduce analysis for cloud logs. Procedia Comput. Sci. 83, 1213\u20131218 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.procs.2017.06.089","volume":"110","author":"M Amar","year":"2017","unstructured":"Amar, M., Douzi, S., El Ouahidi, B., Lemoudden, M.: A novel approach in detecting intrusions using NSLKDD database and MapReduce programming. Procedia Comput. Sci. 110, 230\u2013235 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"6_CR13","unstructured":"Amar, M., Douzi S., El Ouahidi, B.: Enhancing cloud security using advanced MapReduce k-means on log files. In: ACM International Conference Proceeding Series, pp. 63\u201367 (2018)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Amar, M., Lemoudden, M., El Ouahidi, M.: Log file\u2019s centralization to improve cloud security. In: IEEE Xplore, Cloud Computing Technologies and Applications (CloudTech) (2016)","DOI":"10.1109\/CloudTech.2016.7847696"},{"key":"6_CR15","first-page":"1","volume":"69","author":"Z-U Rehman","year":"2017","unstructured":"Rehman, Z.-U., et al.: Machine learning-assisted signature and heuristic-based detection of malwares in Android devices. Comput. Electr. Eng. 69, 1\u201314 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Veeramachaneni, K., Arnaldo, I.: AI2: training a big data machine to defend. In: Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS) (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"key":"6_CR17","unstructured":"Herv\u00e9, B., Tindo, G.: Vers une Nouvelle Architecture de Detection d\u2019Intrusion Reseaux \u00e0 Base de Reseaux Neuronaux. HAL Archives-ouvertes (2016)"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.procs.2017.05.072","volume":"108","author":"J Ya","year":"2017","unstructured":"Ya, J., Liu, T., Li, Q., Shi, J., Zhang, H., Lv, P.: Mining host behavior patterns from massive network and security logs. Procedia Comput. Sci. 108, 38\u201347 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Cathey, R., Ma, L., Goharian, N., Grossman, D.: Misuse Detection for Information Retrieval Systems (2003)","DOI":"10.1145\/956863.956901"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Fan, Z., Liu, R.: Investigation of machine learning based network traffic classification. In: Wireless Communication Systems (ISWCS) (2017)","DOI":"10.1109\/ISWCS.2017.8108090"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.eswa.2017.09.053","volume":"92","author":"Z Katzir","year":"2018","unstructured":"Katzir, Z., Elovici, Y.: Quantifying the resilience of machine learning classifiers used for cyber security. Expert Syst. Appl. 92, 419\u2013429 (2018)","journal-title":"Expert Syst. Appl."},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1016\/j.procs.2015.07.490","volume":"57","author":"P Aggarwal","year":"2015","unstructured":"Aggarwal, P., Sharma, S.K.: Analysis of KDD dataset attributes - class wise for intrusion detection. Procedia Comput. Sci. 57, 842\u2013851 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.procs.2016.06.016","volume":"89","author":"M Belavagi","year":"2016","unstructured":"Belavagi, M., Muniyal, B.: Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Computer Science 89, 117\u2013123 (2016)","journal-title":"Procedia Computer Science"},{"key":"6_CR24","unstructured":"Polamuri, S.: FIve Most Popular Similarity Measures Implementation in Python (2015). [En ligne]. http:\/\/dataaspirant.com\/2015\/04\/11\/five-most-popular-similarity-measures-implementation-in-python\/"},{"key":"6_CR25","unstructured":"Mining Similarity Using Euclidean Distance, Pearson Correlation, and Filtering (2010). [En ligne]. http:\/\/mines.humanoriented.com\/classes\/2010\/fall\/csci568\/portfolio_exports\/mvoget\/similarity\/similarity.html"},{"key":"6_CR26","unstructured":"SotM 31 - The Honeynet Project (2004). [En ligne]. http:\/\/www.honeynet.org\/scans\/scan31\/"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19945-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T13:28:17Z","timestamp":1709818097000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-19945-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030199449","9783030199456"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19945-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"10 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mln2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.adda-association.org\/mln\/Home.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}