{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T16:04:54Z","timestamp":1746806694460,"version":"3.40.5"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642403156"},{"type":"electronic","value":"9783642403163"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40316-3_33","type":"book-chapter","created":{"date-parts":[[2013,8,23]],"date-time":"2013-08-23T01:53:14Z","timestamp":1377222794000},"page":"371-382","source":"Crossref","is-referenced-by-count":5,"title":["Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques"],"prefix":"10.1007","author":[{"given":"Mikhail","family":"Zolotukhin","sequence":"first","affiliation":[]},{"given":"Timo","family":"H\u00e4m\u00e4l\u00e4inen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"Klein, A.: Detecting and Preventing HTTP Response Splitting and HTTP Request Smuggling Attacks at the TCP Level. Tech. Note (August 2005), http:\/\/www.securityfocus.com\/archive\/1\/408135"},{"key":"33_CR2","unstructured":"Axelsson, S.: Research in intrusion-detection systems: a survey. Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden. Technical Report. pp. 98\u2013117 (December 1998)"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Patcha, A., Park, J.M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks: The International Journal of Computer and Telecommunications Networking\u00a051(12) (August 2007)","DOI":"10.1016\/j.comnet.2007.02.001"},{"issue":"15","key":"33_CR4","doi-asserted-by":"publisher","first-page":"1356","DOI":"10.1016\/S0140-3664(02)00037-3","volume":"25","author":"T. Verwoerd","year":"2002","unstructured":"Verwoerd, T., Hunt, R.: Intrusion detection techniques and approaches. Computer Communications - COMCOM\u00a025(15), 1356\u20131365 (2002)","journal-title":"Computer Communications - COMCOM"},{"key":"33_CR5","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MC.2002.1012428","volume":"35","author":"R.A. Kemmerer","year":"2002","unstructured":"Kemmerer, R.A., Vigna, G.: Intrusion Detection: A Brief History and Overview. Computer\u00a035, 27\u201330 (2002)","journal-title":"Computer"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Gollmann, D.: Computer Security, 2nd edn. Wiley (2006)","DOI":"10.1002\/wics.106"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Sriraghavan, R.G.: Data processing and anomaly detection in web-based applications. In: IEEE Workshop on Machine Learning for Signal Processing, MLSP 2008, pp. 187\u2013192 (October 2008)","DOI":"10.1109\/MLSP.2008.4685477"},{"key":"33_CR8","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-23957-1_20","volume-title":"Engineering Applications of Neural Networks","author":"T. Sipola","year":"2011","unstructured":"Sipola, T., Juvonen, A., Lehtonen, J.: Anomaly detection from network logs using diffusion maps. In: Iliadis, L., Jayne, C. (eds.) EANN\/AIAI 2011, Part I. IFIP AICT, vol.\u00a0363, pp. 172\u2013181. Springer, Heidelberg (2011)"},{"key":"33_CR9","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-642-36608-6_18","volume-title":"Web Information Systems and Technologies","author":"M. Zolotukhin","year":"2013","unstructured":"Zolotukhin, M., H\u00e4m\u00e4l\u00e4inen, T., Juvonen, A.: Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks. In: Cordeiro, J., Krempels, K.-H. (eds.) WEBIST 2012. Lecture Notes in Business Information Processing, vol.\u00a0140, pp. 281\u2013295. Springer, Heidelberg (2013)"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Zolotukhin, M., H\u00e4m\u00e4l\u00e4inen, T., Juvonen, A.: Online Anomaly Detection by Using N-gram Model and Growing Hierarchical Self-Organizing Maps. In: Proc. of the IWCMC (2012)","DOI":"10.1109\/IWCMC.2012.6314176"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Kirchner, M.: A framework for detecting anomalies in HTTP traffic using instance-based learning and k-nearest neighbor classification. In: 2nd International Workshop on Security and Communication Networks (IWSCN), pp. 1\u20138 (May 2010)","DOI":"10.1109\/IWSCN.2010.5497997"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Vigna, G.: Anomaly detection of web-based attacks. In: Proc. of the 10th ACM Conference on Computer and Communications Security, pp. 251\u2013261 (2003)","DOI":"10.1145\/948109.948144"},{"key":"33_CR13","unstructured":"Lucchese, L.: Data processing and anomaly detection in web-based applications. In: IEEE Workshop on Machine Learning for Signal Processing, MLSP 2008, pp. 187\u2013192 (October 2008)"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Lin, L., Leckie, C., Chenfeng, Z.: Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-Grams. In: 4th International Conference on Network and System Security (NSS), pp. 113\u2013119 (September 2010)","DOI":"10.1109\/NSS.2010.49"},{"key":"33_CR15","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1016\/j.comnet.2006.09.016","volume":"51","author":"K. Ingham","year":"2007","unstructured":"Ingham, K., Somayaji, A., Burge, J., Forrest, S.: Learning DFA representations of HTTP for protecting web applications. Computer Networks\u00a051, 1239\u20131255 (2007)","journal-title":"Computer Networks"},{"key":"33_CR16","unstructured":"Sun, M., Xuelei, H., Yang, J.: Grammar-Based Anomaly Methods for HTTP Attacks. In: Chinese Conference on Pattern Recognition, CCPR 2009, vol.\u00a01-5 (November 2009)"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Suen, C.Y.: N-Gram Statistics for Natural Language Understanding and Text Processing. IEEE Transactions on Pattern Analysis and Machine Intelligence PAMI-1(2), 164\u2013172 (1979)","DOI":"10.1109\/TPAMI.1979.4766902"},{"issue":"4","key":"33_CR18","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1109\/TASL.2008.2012323","volume":"17","author":"T. Hirsimaki","year":"2009","unstructured":"Hirsimaki, T., Pylkkonen, J., Kurimo, M.: Importance of High-Order N-Gram Models in Morph-Based Speech Recognition. IEEE Transactions on Audio, Speech, and Language Processing\u00a017(4), 724\u2013732 (2009)","journal-title":"IEEE Transactions on Audio, Speech, and Language Processing"},{"key":"33_CR19","unstructured":"Corona, I., Giacinto, G.: Detection of Server-side Web Attacks. In: Proc. of JMLR: Workshop on Applications of Pattern Analysis, pp. 160\u2013166 (2010)"},{"issue":"3","key":"33_CR20","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"A. Jain","year":"1999","unstructured":"Jain, A., Murty, M., Flynn, P.: Data clustering: a review. ACM Computing Surveys\u00a031(3), 264\u2013323 (1999) ISSN 0360-0300","journal-title":"ACM Computing Surveys"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Xie, J.: A Simple and Fast Algorithm for Global K-means Clustering. In: Proc. of 2nd International Workshop Education Technology and Computer Science (ETCS), vol.\u00a02, pp. 36\u201340 (March 2010)","DOI":"10.1109\/ETCS.2010.347"},{"key":"33_CR22","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proc. of 2nd International Conference on Knowledge Discovery and Data Mining, pp. 226\u2013231 (1996)"},{"key":"33_CR23","unstructured":"Kim, J.: The Anomaly Detection by Using DBSCAN Clustering with Multiple Parameters. In: Proc. of ICISA, pp. 1\u20135 (April 2011)"},{"key":"33_CR24","doi-asserted-by":"crossref","unstructured":"Smiti, A.: DBSCAN-GM: An improved clustering method based on Gaussian Means and DBSCAN techniques. In: Proc. of International Conference on Intelligent Engineering Systems (INES), pp. 573\u2013578 (June 2012)","DOI":"10.1109\/INES.2012.6249802"},{"key":"33_CR25","unstructured":"Apache 2.0 Documentation (2011), http:\/\/www.apache.org\/"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40316-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T16:53:43Z","timestamp":1646412823000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40316-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642403156","9783642403163"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40316-3_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}