{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:25:39Z","timestamp":1742988339407,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031368219"},{"type":"electronic","value":"9783031368226"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36822-6_26","type":"book-chapter","created":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T03:25:54Z","timestamp":1689305154000},"page":"301-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection and\u00a0Classification of\u00a0Web Application Attacks"],"prefix":"10.1007","author":[{"given":"Jayanthi","family":"Ramamoorthy","sequence":"first","affiliation":[]},{"given":"Damilola","family":"Oladimeji","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Garland","sequence":"additional","affiliation":[]},{"given":"Qingzhong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,15]]},"reference":[{"issue":"1","key":"26_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"26_CR2","unstructured":"BritneyMuller: Bert 101 - state of the art NLP model explained. https:\/\/huggingface.co\/blog\/bert-101#4-berts-performance-on-common-language-tasks"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Center, V.S.R.C.I.: 2022 data breach investigations report. https:\/\/github.com\/vz-risk\/dbir\/tree\/gh-pages\/2022","DOI":"10.12968\/S1361-3723(22)70578-7"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"26_CR5","doi-asserted-by":"publisher","unstructured":"Clincy, V., Shahriar, H.: Web service injection attack detection. In: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 173\u2013178 (2017). https:\/\/doi.org\/10.23919\/ICITST.2017.8356371","DOI":"10.23919\/ICITST.2017.8356371"},{"issue":"3","key":"26_CR6","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"1","key":"26_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"TM Cover","year":"1967","unstructured":"Cover, T.M., Hart, P.E.: Nearest neighbor pattern classification. IEEE Trans. Inf. Theory 13(1), 21\u201327 (1967)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"26_CR8","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2019)"},{"issue":"1","key":"26_CR9","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/s13198-015-0376-0","volume":"8","author":"S Gupta","year":"2017","unstructured":"Gupta, S., Gupta, B.B.: Cross-site scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art. Int. J. Syst. Assur. Eng. Manage. 8(1), 512\u2013530 (2017)","journal-title":"Int. J. Syst. Assur. Eng. Manage."},{"issue":"3","key":"26_CR10","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw, A., Wiener, M.: Classification and regression by randomForest. R News 2(3), 18\u201322 (2002)","journal-title":"R News"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Liu, C.z., Sheng, Y.x., Wei, Z.q., Yang, Y.Q.: Research of text classification based on improved TF-IDF algorithm. In: 2018 IEEE International Conference of Intelligent Robotic and Control Engineering (IRCE), pp. 218\u2013222. IEEE (2018)","DOI":"10.1109\/IRCE.2018.8492945"},{"key":"26_CR12","doi-asserted-by":"publisher","unstructured":"Moh, M., Pininti, S., Doddapaneni, S., Moh, T.S.: Detecting web attacks using multi-stage log analysis. In: 2016 IEEE 6th International Conference on Advanced Computing (IACC), pp. 733\u2013738 (2016). https:\/\/doi.org\/10.1109\/IACC.2016.141","DOI":"10.1109\/IACC.2016.141"},{"key":"26_CR13","unstructured":"OWASP.org: Owasp top ten. https:\/\/owasp.org\/www-project-top-ten\/"},{"key":"26_CR14","unstructured":"Profile, T.G.A.V.: The 10 most common website security attacks and how to protect yourself. https:\/\/www.tripwire.com\/state-of-security\/most-common-website-security-attacks-and-how-to-protect-yourself"},{"key":"26_CR15","unstructured":"Quinlan, J.R.: C4.5: programs for machine learning. In: Proceedings of the 5th Australian Joint Conference on Artificial Intelligence. Lecture Notes in Computer Science, vol. 717, pp. 424\u2013427. Springer, Cham (1993)"},{"key":"26_CR16","doi-asserted-by":"publisher","unstructured":"Ren, X., Hu, Y., Kuang, W., Souleymanou, M.B.: A web attack detection technology based on bag of words and hidden Markov model. In: 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 526\u2013531 (2018). https:\/\/doi.org\/10.1109\/MASS.2018.00081","DOI":"10.1109\/MASS.2018.00081"},{"key":"26_CR17","doi-asserted-by":"publisher","unstructured":"Riera, T.S., Higuera, J.R.B., Higuera, J.B., Herraiz, J.J.M., Montalvo, J.A.S.: A new multi-label dataset for web attacks CAPEC classification using machine learning techniques. Comput. Secur. 120, 102788 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102788, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404822001833","DOI":"10.1016\/j.cose.2022.102788"},{"key":"26_CR18","doi-asserted-by":"publisher","unstructured":"Seyyar, Y.E., Yavuz, A.G., \u00dcnver, H.M.: Detection of web attacks using the BERT model. In: 2022 30th Signal Processing and Communications Applications Conference (SIU), pp. 1\u20134 (2022). https:\/\/doi.org\/10.1109\/SIU55565.2022.9864721","DOI":"10.1109\/SIU55565.2022.9864721"},{"issue":"10","key":"26_CR19","first-page":"29","volume":"5","author":"S Shah","year":"2015","unstructured":"Shah, S., Bhatnagar, D.: Feature selection using logistic regression and support vector machine. Int. J. Eng. Res. Appl. 5(10), 29\u201333 (2015)","journal-title":"Int. J. Eng. Res. Appl."},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Sharma, C., Jain, S.: Analysis and classification of SQL injection vulnerabilities and attacks on web applications. In: 2014 International Conference on Advances in Engineering & Technology Research (ICAETR-2014), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/ICAETR.2014.7012815"},{"key":"26_CR21","doi-asserted-by":"publisher","unstructured":"Sharma, S., Zavarsky, P., Butakov, S.: Machine learning based intrusion detection system for web-based attacks. In: 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), pp. 227\u2013230 (2020). https:\/\/doi.org\/10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00048","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00048"},{"key":"26_CR22","doi-asserted-by":"publisher","unstructured":"Conde Camillo da Silva, R., Oliveira Camargo, M.P., Sanches Quessada, M., Claiton Lopes, A., Diassala Monteiro Ernesto, J., Pontara da Costa, K.A.: An intrusion detection system for web-based attacks using IBM Watson. IEEE Latin Am. Trans. 20(2), 191\u2013197 (2022). https:\/\/doi.org\/10.1109\/TLA.2022.9661457","DOI":"10.1109\/TLA.2022.9661457"},{"key":"26_CR23","unstructured":"Technologies, P.: Web application attack trends (2020). https:\/\/www.ptsecurity.com\/ww-en\/analytics\/web-application-attack-trends-2017\/"},{"key":"26_CR24","doi-asserted-by":"publisher","unstructured":"Tian, J.W., Zhu, H.Y., Li, X., Tian, Z.: Real-time online detection method for web attack based on flow data analysis. In: 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), pp. 991\u2013994 (2018). https:\/\/doi.org\/10.1109\/ICSESS.2018.8663848","DOI":"10.1109\/ICSESS.2018.8663848"},{"issue":"1","key":"26_CR25","first-page":"1","volume":"13","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Gudmundsson, M., Leiringer, R.: A comparative study of supervised machine learning algorithms for credit scoring purposes. J. Credit Risk 13(1), 1\u201332 (2017)","journal-title":"J. Credit Risk"},{"issue":"1","key":"26_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00460-8","volume":"8","author":"R Zuech","year":"2021","unstructured":"Zuech, R., Hancock, J., Khoshgoftaar, T.M.: Detecting web attacks using random undersampling and ensemble learners. J. Big Data 8(1), 1\u201320 (2021). https:\/\/doi.org\/10.1186\/s40537-021-00460-8","journal-title":"J. Big Data"}],"container-title":["Lecture Notes in Computer Science","Advances and Trends in Artificial Intelligence. Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36822-6_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T03:28:27Z","timestamp":1689305307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36822-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031368219","9783031368226"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36822-6_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IEA\/AIE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ieaaie2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ieaaie2023.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"129","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}