{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T14:10:06Z","timestamp":1746367806630,"version":"3.40.4"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112886"},{"type":"electronic","value":"9783319112893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11289-3_39","type":"book-chapter","created":{"date-parts":[[2014,9,5]],"date-time":"2014-09-05T01:07:33Z","timestamp":1409879253000},"page":"384-393","source":"Crossref","is-referenced-by-count":1,"title":["Collective Detection of Potentially Harmful Requests Directed at Web Sites"],"prefix":"10.1007","author":[{"given":"Marek","family":"Zachara","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Defense in Depth: A practical strategy for achieving Information Assurance in today\u2019s highly networked environments, http:\/\/www.nsa.gov\/ia\/_files\/support\/defenseindepth.pdf , http:\/\/www.nsa.gov\/ia\/_files\/support\/defenseindepth.pdf"},{"key":"39_CR2","unstructured":"PhpMyAdmin, http:\/\/sourceforge.net\/projects\/phpmyadmin\/"},{"key":"39_CR3","unstructured":"Agosti, M., Crivellari, F., Di Nunzio, G.: Web log analysis: a review of a decade of studies about information acquisition, inspection and interpretation of user interaction. Data Mining and Knowledge Discovery 24(3), 663\u2013696 (2012), http:\/\/dx.doi.org\/10.1007\/s10618-011-0228-8 , http:\/\/www.bibsonomy.org\/bibtex\/29b85b7d3c5587c5f0920f0d602ba93b1\/sdo"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Auxilia, M., Tamilselvan, D.: Anomaly detection using negative security model in web application. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), pp. 481\u2013486 (2010)","DOI":"10.1109\/CISIM.2010.5643461"},{"key":"39_CR5","unstructured":"Christey, S.: 2011 CWE\/SANS Top 25 Most Dangerous Software Errors. Tech. rep. (2011), http:\/\/cwe.mitre.org\/top25\/archive\/2011\/2011_cwe_sans_top25.pdf"},{"key":"39_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74320-0_4","volume-title":"Recent Advances in Intrusion Detection","author":"M. Cova","year":"2007","unstructured":"Cova, M., Balzarotti, D., Felmetsger, V., Vigna, G.: Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol.\u00a04637, pp. 63\u201386. Springer, Heidelberg (2007), http:\/\/dx.doi.org\/10.1007\/978-3-540-74320-0_4"},{"key":"39_CR7","unstructured":"Iv\u00e1ncsy, R., Vajk, I.: Frequent Pattern Mining in Web Log Data. Acta Polytechnica Hungarica 3(1) (2006), http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.101.4559 ; http:\/\/www.bibsonomy.org\/bibtex\/2f29f4627c9ae99370fc7ba005982e2e6\/sdo"},{"key":"39_CR8","unstructured":"iVIZ: Web Application Vulnerability Statistics Report (2013), http:\/\/www.securitybistro.com\/?p=4966"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Johari, R., Sharma, P.: A Survey on Web Application Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL Injection. In: 2012 International Conference on Communication Systems and Network Technologies (CSNT), pp. 453\u2013458 (2012)","DOI":"10.1109\/CSNT.2012.104"},{"key":"39_CR10","unstructured":"JSON: A lightweight data-interchange format, http:\/\/www.json.org"},{"key":"39_CR11","unstructured":"Kayne, R.: What Are Script Kiddies, http:\/\/www.wisegeek.com\/what-are-script-kiddies.htm"},{"key":"39_CR12","unstructured":"Kruegel, C., Vigna, G.: Anomaly Detection of Web-Based Attacks. pp. 251\u2013261. ACM Press (2003), http:\/\/www.bibsonomy.org\/bibtex\/2099e1b9a6e57960e4b3e02410e83cb64\/liangzk"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Computer Networks 48(5), 717\u2013738 (2005), http:\/\/dx.doi.org\/10.1016\/j.comnet.2005.01.009","DOI":"10.1016\/j.comnet.2005.01.009"},{"key":"39_CR14","unstructured":"Netcraft: Web Server Survey (2013), http:\/\/news.netcraft.com\/archives\/2013\/11\/01\/november-2013-web-server-survey.html"},{"key":"39_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-642-23300-5_23","volume-title":"Availability, Reliability and Security for Business, Enterprise and Health Information Systems","author":"D. Pa\u0142ka","year":"2011","unstructured":"Pa\u0142ka, D., Zachara, M.: Learning web application firewall - benefits and caveats. In: Tjoa, A.M., Quirchmayr, G., You, I., Xu, L. (eds.) ARES 2011. LNCS, vol.\u00a06908, pp. 295\u2013308. Springer, Heidelberg (2011), http:\/\/dl.acm.org\/citation.cfm?id=2033973.2033999"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Sun, Z., Sheng, H., Wei, M., Yang, J., Zhang, H., Wang, L.: Application of web log mining in local area network security. In: EMEIT. pp. 3897\u20133900. IEEE (2011), http:\/\/dblp.uni-trier.de\/db\/conf\/emeit\/emeit2011.html#SunSWYZW11 ; http:\/\/dx.doi.org\/10.1109\/EMEIT.2011.6023097 ; http:\/\/www.bibsonomy.org\/bibtex\/23badf5326d9486b9b17c48ab47576eaa\/dblp","DOI":"10.1109\/EMEIT.2011.6023097"},{"key":"39_CR17","unstructured":"Symantec: Internet Security Threat Report (2013), http:\/\/www.symantec.com\/security_response\/publications\/threatreport.jsp"},{"key":"39_CR18","unstructured":"WhiteHat: Website Security Statistics Report (2013), http:\/\/info.whitehatsec.com\/2013-website-security-report.html"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence. Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11289-3_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T13:28:09Z","timestamp":1746365289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11289-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319112886","9783319112893"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11289-3_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}