{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:41:24Z","timestamp":1759092084577,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030630850"},{"type":"electronic","value":"9783030630867"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63086-7_27","type":"book-chapter","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T08:07:25Z","timestamp":1607674045000},"page":"481-502","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-supervised Neural Networks"],"prefix":"10.1007","author":[{"given":"Xiaoyong","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Lei","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Malek Ben","family":"Salem","sequence":"additional","affiliation":[]},{"given":"Xiaolin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dapeng","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,12]]},"reference":[{"issue":"3","key":"27_CR1","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s00778-006-0014-1","volume":"17","author":"M Awad","year":"2008","unstructured":"Awad, M., Khan, L., Thuraisingham, B.: Predicting www surfing using multiple evidence combination. VLDB J. 17(3), 401\u2013417 (2008)","journal-title":"VLDB J."},{"issue":"4","key":"27_CR2","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1109\/TSMCB.2012.2187441","volume":"42","author":"MA Awad","year":"2012","unstructured":"Awad, M.A., Khalil, I.: Prediction of user\u2019s web-browsing behavior: application of Markov model. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 42(4), 1131\u20131142 (2012)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B (Cybern.)"},{"key":"27_CR3","unstructured":"Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. In: NIPS Deep Learning and Representation Learning Workshop (2014)"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Da, N.T., Hanh, T., Duy, P.H.: A survey of webpage access prediction. In: 2018 International Conference on Advanced Technologies for Communications (ATC), pp. 315\u2013320. IEEE (2018)","DOI":"10.1109\/ATC.2018.8587490"},{"key":"27_CR5","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers), pp. 4171\u20134186 (2019)"},{"key":"27_CR6","unstructured":"Dong, Y., Zhang, Y.: Adaptively detecting malicious queries in web attacks. arXiv preprint arXiv:1701.07774 (2017)"},{"key":"27_CR7","doi-asserted-by":"publisher","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS) (2017). https:\/\/doi.org\/10.1145\/3133956.3134015","DOI":"10.1145\/3133956.3134015"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"El-Sayed, M., Ruiz, C., Rundensteiner, E.A.: Fs-Miner: efficient and incremental mining of frequent sequence patterns in web logs. In: Proceedings of the 6th Annual ACM International Workshop on Web Information and Data Management, pp. 128\u2013135 (2004)","DOI":"10.1145\/1031453.1031477"},{"key":"27_CR9","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.comnet.2003.12.016","volume":"45","author":"JM Estevez-Tapiador","year":"2004","unstructured":"Estevez-Tapiador, J.M., Garcia-Teodoro, P., Diaz-Verdejo, J.: Measuring normality in http traffic for anomaly-based intrusion detection. Comput. Netw. 45, 175\u2013193 (2004)","journal-title":"Comput. Netw."},{"key":"27_CR10","unstructured":"Hochreiter, S., Bengio, Y., Frasconi, P., Schmidhuber, J., et al.: Gradient flow in recurrent nets: the difficulty of learning long-term dependencies (2001)"},{"issue":"8","key":"27_CR11","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"27_CR12","doi-asserted-by":"publisher","first-page":"429","DOI":"10.3233\/IDA-2002-6504","volume":"6","author":"N Japkowicz","year":"2002","unstructured":"Japkowicz, N., Stephen, S.: The class imbalance problem: a systematic study. Intell. Data Anal. 6, 429\u2013449 (2002)","journal-title":"Intell. Data Anal."},{"key":"27_CR13","unstructured":"Jing, L., Tian, Y.: Self-supervised visual feature learning with deep neural networks: a survey. IEEE Trans. Pattern Anal. Mach. Intell. (2020). https:\/\/ieeexplore.ieee.org\/abstract\/document\/9086055"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Juvonen, A., Sipola, T.: Adaptive framework for network traffic classification using dimensionality reduction and clustering. In: 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems, pp. 274\u2013279. IEEE (2012)","DOI":"10.1109\/ICUMT.2012.6459678"},{"key":"27_CR15","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.comnet.2015.07.019","volume":"91","author":"A Juvonen","year":"2015","unstructured":"Juvonen, A., Sipola, T., H\u00e4\u00e4m\u00e4l\u00e4inen, T.: Online anomaly detection using dimensionality reduction techniques for HTTP log analysis. Comput. Netw. 91, 46\u201356 (2015)","journal-title":"Comput. Netw."},{"key":"27_CR16","volume-title":"Markov Chains","author":"JG Kemeny","year":"1976","unstructured":"Kemeny, J.G., Snell, J.L.: Markov Chains. Springer, New York (1976)"},{"key":"27_CR17","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: International Conference for Learning Representations (2015)"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Vigna, G.: Anomaly detection of web-based attacks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 251\u2013261. ACM (2003)","DOI":"10.1145\/948109.948144"},{"issue":"5","key":"27_CR19","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1016\/j.comnet.2005.01.009","volume":"48","author":"C Kruegel","year":"2005","unstructured":"Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Comput. Netw. 48(5), 717\u2013738 (2005)","journal-title":"Comput. Netw."},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Liang, J., Zhao, W., Ye, W.: Anomaly-based web attack detection: a deep learning approach. In: Proceedings of the 2017 VI International Conference on Network, Communication and Computing, pp. 80\u201385. ACM (2017)","DOI":"10.1145\/3171592.3171594"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Liu, T., Qi, Y., Shi, L., Yan, J.: Locate-then-detect: real-time web attack detection via attention-based deep neural networks. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence, pp. 4725\u20134731. AAAI Press (2019)","DOI":"10.24963\/ijcai.2019\/656"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Oprea, A., Li, Z., Norris, R., Bowers, K.: MADE: security analytics for enterprise threat detection. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 124\u2013136. ACM (2018)","DOI":"10.1145\/3274694.3274710"},{"key":"27_CR23","unstructured":"OWASP: Buffer overflow. https:\/\/www.owasp.org\/index.php\/Buffer_Overflow"},{"key":"27_CR24","unstructured":"OWASP: Crlf injection. https:\/\/www.owasp.org\/index.php\/CRLF_Injection"},{"key":"27_CR25","unstructured":"OWASP: Cross-site scripting (xss). https:\/\/www.owasp.org\/index.php\/Cross-site_Scripting_(XSS)"},{"key":"27_CR26","unstructured":"OWASP: Server-side includes (ssi) injection. https:\/\/www.owasp.org\/index.php\/Server-Side_Includes_(SSI)_Injection"},{"key":"27_CR27","unstructured":"OWASP: Sql injection. https:\/\/www.owasp.org\/index.php\/SQL_Injection"},{"key":"27_CR28","unstructured":"OWASP: Zed attack proxy project. https:\/\/www.owasp.org\/index.php\/OWASP_Zed_Attack_Proxy_Project"},{"key":"27_CR29","doi-asserted-by":"crossref","unstructured":"Pham, T.S., Hoang, T.H., Vu, V.C.: Machine learning techniques for web intrusion detection - a comparison. In: Proceedings of the 8th International Conference on Knowledge and Systems Engineering, pp. 291\u2013297. IEEE (2016)","DOI":"10.1109\/KSE.2016.7758069"},{"key":"27_CR30","doi-asserted-by":"crossref","unstructured":"Raina, R., Battle, A., Lee, H., Packer, B., Ng, A.Y.: Self-taught learning: transfer learning from unlabeled data. In: Proceedings of the 24th International Conference on Machine Learning, pp. 759\u2013766. ACM (2007)","DOI":"10.1145\/1273496.1273592"},{"key":"27_CR31","unstructured":"Robertson, W., Vigna, G., Kruegel, C., Kemmerer, R.A., et al.: Using generalization and characterization techniques in the anomaly-based detection of web attacks. In: NDSS (2006)"},{"key":"27_CR32","doi-asserted-by":"crossref","unstructured":"Sharif, M., Urakawa, J., Christin, N., Kubota, A., Yamada, A.: Predicting impending exposure to malicious content from user behavior. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1487\u20131501. ACM (2018)","DOI":"10.1145\/3243734.3243779"},{"key":"27_CR33","doi-asserted-by":"publisher","unstructured":"Shen, Y., Mariconti, E., Vervier, P.A., Stringhini, G.: Tiresias: predicting security events through deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS) (2018). https:\/\/doi.org\/10.1145\/3243734.3243811","DOI":"10.1145\/3243734.3243811"},{"key":"27_CR34","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-23957-1_20","volume-title":"Engineering Applications of Neural Networks","author":"T Sipola","year":"2011","unstructured":"Sipola, T., Juvonen, A., Lehtonen, J.: Anomaly detection from network logs using diffusion maps. In: Iliadis, L., Jayne, C. (eds.) AIAI\/EANN -2011. IAICT, vol. 363, pp. 172\u2013181. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23957-1_20"},{"key":"27_CR35","doi-asserted-by":"crossref","unstructured":"Su, Z., Yang, Q., Lu, Y., Zhang, H.: WhatNext: a prediction system for web requests using n-gram sequence models. In: Proceedings of the First International Conference on Web Information Systems Engineering, vol. 1, pp. 214\u2013221. IEEE (2000)","DOI":"10.1109\/WISE.2000.882395"},{"key":"27_CR36","doi-asserted-by":"crossref","unstructured":"Yang, Q., Zhang, H.H., Li, T.: Mining web logs for prediction models in www caching and prefetching. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 473\u2013478 (2001)","DOI":"10.1145\/502512.502584"},{"key":"27_CR37","unstructured":"Yu, Y., Yan, H., Guan, H., Zhou, H.: DeepHTTP: semantics-structure model with attention for anomalous HTTP traffic detection and pattern mining. arXiv preprint arXiv:1810.12751 (2018)"},{"key":"27_CR38","doi-asserted-by":"crossref","unstructured":"Zolotukhin, M., H\u00e4m\u00e4l\u00e4inen, T., Kokkonen, T., Siltanen, J.: Analysis of http requests for anomaly detection of web attacks. In: Proceedings of the 12th International Conference on Dependable, Autonomic and Secure Computing. IEEE (2014)","DOI":"10.1109\/DASC.2014.79"},{"key":"27_CR39","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, pp. 5998\u20136008 (2017)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63086-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,18]],"date-time":"2024-08-18T22:22:59Z","timestamp":1724019779000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-63086-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030630850","9783030630867"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63086-7_27","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"120","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,86","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}