{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:47:50Z","timestamp":1742924870825,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030614003"},{"type":"electronic","value":"9783030614010"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61401-0_50","type":"book-chapter","created":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T09:03:04Z","timestamp":1603184584000},"page":"535-546","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning for Web Intrusion Detection: A Comparative Analysis of Feature Selection Methods mRMR and PFI"],"prefix":"10.1007","author":[{"given":"Thiago Jos\u00e9","family":"Lucas","sequence":"first","affiliation":[]},{"given":"Carlos Alexandre Carvalho","family":"Tojeiro","sequence":"additional","affiliation":[]},{"given":"Rafael Gon\u00e7alves","family":"Pires","sequence":"additional","affiliation":[]},{"given":"Kelton Augusto Pontara","family":"da Costa","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o Paulo","family":"Papa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"key":"50_CR1","unstructured":"Alrawashdeh, K.: Toward a hardware-assisted online intrusion detection system based on deep learning algorithms for resource-limited embedded systems. Doctoral dissertation, University of Cincinnati (2018)"},{"key":"50_CR2","doi-asserted-by":"crossref","unstructured":"Alrawashdeh, K., Purdy, C.: Reducing calculation requirements in FPGA implementation of deep learning algorithms for online anomaly intrusion detection. In: IEEE National Aerospace and Electronics Conference, pp. 57\u201362. IEEE (2017)","DOI":"10.1109\/NAECON.2017.8268745"},{"issue":"10","key":"50_CR3","doi-asserted-by":"publisher","first-page":"1340","DOI":"10.1093\/bioinformatics\/btq134","volume":"26","author":"A Altmann","year":"2010","unstructured":"Altmann, A., Tolosi, L., Sander, O., Lengauer, T.: Permutation importance: a corrected feature importance measure. Bioinformatics 26(10), 1340\u20131347 (2010)","journal-title":"Bioinformatics"},{"key":"50_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1200-4","volume-title":"Predictive Analytics with Microsoft Azure Machine Learning","author":"R Barga","year":"2015","unstructured":"Barga, R., Fontama, V., Tok, W.H., Cabrera-Cordon, L.: Predictive Analytics with Microsoft Azure Machine Learning. Apress, Berkely (2015)"},{"key":"50_CR5","unstructured":"Bleik, S.: Permutation Feature Importance. \nhttps:\/\/blogs.technet.microsoft.com\/machinelearning\/2015\/04\/14\/permutation-feature-importance\n\n. Accessed 3 Dec 2019"},{"key":"50_CR6","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-981-13-1921-1_35","volume-title":"Smart Intelligent Computing and Applications","author":"R Chapaneri","year":"2019","unstructured":"Chapaneri, R., Shah, S.: A comprehensive survey of machine learning-based network intrusion detection. In: Satapathy, S.C., Bhateja, V., Das, S. (eds.) Smart Intelligent Computing and Applications. SIST, vol. 104, pp. 345\u2013356. Springer, Singapore (2019). \nhttps:\/\/doi.org\/10.1007\/978-981-13-1921-1_35"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Etaati, L.: Azure machine learning studio. In: Machine Learning with Microsoft Technologies, pp. 201\u2013223. Apress, Berkeley (2019)","DOI":"10.1007\/978-1-4842-3658-1_12"},{"key":"50_CR8","unstructured":"Gim\u00e9nez, C.T., Villegas, A.P., Mara\u00f1\u00f3n, G.\u00c1.: HTTP data set CSIC 2010. Information Security Institute of CSIC, Spanish Research National Council (2010)"},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Go, W., Lee, D.: Toward trustworthy deep learning in security. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2219\u20132221. ACM (2018)","DOI":"10.1145\/3243734.3278526"},{"key":"50_CR10","unstructured":"Han, E.: Analyzing and classifying web application attacks. Int. J. Adv. Electron. Comput. Sci. 2(4) (2015)"},{"key":"50_CR11","unstructured":"Kaur, S., Singh, M.G.: Network Security Model for Attack Signature Generation, Tracking and Analysis. Doctoral dissertation (2015)"},{"key":"50_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1007\/978-3-662-45237-0_61","volume-title":"Computer Information Systems and Industrial Management","author":"R Kozik","year":"2014","unstructured":"Kozik, R., Chora\u015b, M., Renk, R., Ho\u0142ubowicz, W.: A proposal of algorithm for web applications cyber attack detection. In: Saeed, K., Sn\u00e1\u0161el, V. (eds.) CISIM 2014. LNCS, vol. 8838, pp. 680\u2013687. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-45237-0_61"},{"issue":"1","key":"50_CR13","first-page":"132","volume":"4","author":"R Maini","year":"2019","unstructured":"Maini, R., Bvducoep, P., Pandey, R., Kumar, R., Gupta, R.: Automated web vulnerability scanner. Int. J. Eng. Appl. Sci. Technol. 4(1), 132\u2013136 (2019). ISSN 2455-2143","journal-title":"Int. J. Eng. Appl. Sci. Technol."},{"key":"50_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-21323-6_4","volume-title":"Computational Intelligence in Security for Information Systems","author":"HT Nguyen","year":"2011","unstructured":"Nguyen, H.T., Torrano-Gimenez, C., Alvarez, G., Petrovi\u0107, S., Franke, K.: Application of the generic feature selection measure in detection of web attacks. In: Herrero, \u00c1., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 25\u201332. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-21323-6_4"},{"key":"50_CR15","unstructured":"Owasp Foundation: OWASP Top 10 Application Security Risks 2017. \nhttps:\/\/www.owasp.org\/index.php\/Top_10-2017_Top_10\n\n. Accessed 1 Dec 2019"},{"key":"50_CR16","doi-asserted-by":"crossref","unstructured":"Parthy, P.P., Rajendran, G.: Identification and prevention of social engineering attacks on an enterprise. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/CCST.2019.8888441"},{"key":"50_CR17","unstructured":"Perez-Villegas, A., Torrano-Gimenez, C., Alvarez, G.: Applying Markov chains to web intrusion detection. In: Proceedings of Reuni\u00f3n Espanola sobre Criptolog\u00eda y Seguridad de la Informaci\u00f3n (RECSI 2010), pp. 361\u2013366 (2010)"},{"issue":"1","key":"50_CR18","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s12859-016-1423-9","volume":"18","author":"M Radovic","year":"2017","unstructured":"Radovic, M., Ghalwash, M., Filipovic, N., Obradovic, Z.: Minimum redundancy maximum relevance feature selection approach for temporal gene expression data. BMC Bioinformatics 18(1), 9 (2017)","journal-title":"BMC Bioinformatics"},{"key":"50_CR19","doi-asserted-by":"publisher","unstructured":"Masud Rana, Md., Ahmed, K.: Feature selection and biomedical signal classification using minimum redundancy maximum relevance and artificial neural network. In: Uddin, M.S., Bansal, J.C. (eds.) Proceedings of International Joint Conference on Computational Intelligence. AIS, pp. 207\u2013214. Springer, Singapore (2020). \nhttps:\/\/doi.org\/10.1007\/978-981-13-7564-4_18","DOI":"10.1007\/978-981-13-7564-4_18"},{"key":"50_CR20","doi-asserted-by":"crossref","unstructured":"Ren, J., Zheng, Z., Liu, Q., Wei, Z., Yan, H.: A buffer overflow prediction approach based on software metrics and machine learning. Secur. Commun. Netw. (2019)","DOI":"10.1155\/2019\/8391425"},{"key":"50_CR21","first-page":"106960","volume":"1666","author":"GE Rodr\u00edguez","year":"2019","unstructured":"Rodr\u00edguez, G.E., Torres, J.G., Flores, P., Benavides, D.E.: Cross-site scripting (XSS) attacks and mitigation: a survey. Comput. Netw. 1666, 106960 (2019)","journal-title":"Comput. Netw."},{"key":"50_CR22","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-981-13-3600-3_12","volume-title":"Soft Computing and Signal Processing","author":"R Smitha","year":"2019","unstructured":"Smitha, R., Hareesha, K.S., Kundapur, P.P.: A machine learning approach for web intrusion detection: MAMLS perspective. In: Wang, J., Reddy, G.R.M., Prasad, V.K., Reddy, V.S. (eds.) Soft Computing and Signal Processing. AISC, vol. 900, pp. 119\u2013133. Springer, Singapore (2019). \nhttps:\/\/doi.org\/10.1007\/978-981-13-3600-3_12"},{"key":"50_CR23","unstructured":"Symantec Internet Security Threat Report. \nhttps:\/\/www.symantec.com\/content \/dam\/symantec\/docs\/reports\/istr-24-2019-en.pdf\n\n. Accessed 30 Nov 2019"},{"key":"50_CR24","unstructured":"Torrano-Gim\u00e9nez, C., Perez-Villegas, A., Alvarez, G.: An anomaly-based approach for intrusion detection in web traffic (2010)"},{"key":"50_CR25","series-title":"Advances in Intelligent and Soft Computing","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-642-04091-7_11","volume-title":"Computational Intelligence in Security for Information Systems","author":"C Torrano-Gimenez","year":"2009","unstructured":"Torrano-Gimenez, C., Perez-Villegas, A., Alvarez, G.: A self-learning anomaly-based web application firewall. In: Herrero, \u00c1., Gastaldo, P., Zunino, R., Corchado, E. (eds.) Computational Intelligence in Security for Information Systems. Advances in Intelligent and Soft Computing, vol. 63, pp. 85\u201392. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-04091-7_11"},{"key":"50_CR26","doi-asserted-by":"crossref","unstructured":"Torrano-Gimenez, C., P\u00e9erez-Villegas, A., \u00c1lvarez, G., Fern\u00e1ndez-Medina, E., Malek, M., Hernando, J.: An anomaly-based web application firewall. In: SECRYPT, pp. 23\u201328 (2009)","DOI":"10.1007\/978-3-642-04091-7_11"},{"key":"50_CR27","doi-asserted-by":"crossref","unstructured":"Torrano-Gimenez, C., Nguyen, H.T., Alvarez, G., Petrovic, S., Franke, K.: Applying feature selection to payload-based web application firewalls. In: International Workshop on Security and Communication Networks, pp. 75\u201381. IEEE (2011)","DOI":"10.1109\/IWSCN.2011.6827720"},{"key":"50_CR28","doi-asserted-by":"crossref","unstructured":"Wang, B., Gong, N.Z.: Stealing hyperparameters in machine learning. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 36\u201352. IEEE (2018)","DOI":"10.1109\/SP.2018.00038"},{"key":"50_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, H., Zhao, B., Yuan, H., Zhao, J., Yan, X., Li, F.: SQL injection detection based on deep belief network. In: Proceedings of the 3rd International Conference on Computer Science and Application Engineering, p. 20. ACM (2019)","DOI":"10.1145\/3331453.3361280"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61401-0_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T09:34:33Z","timestamp":1603186473000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61401-0_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030614003","9783030614010"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61401-0_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"7 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Soft Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zakopane","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaisc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}