{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:02:43Z","timestamp":1742965363813,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662496183"},{"type":"electronic","value":"9783662496190"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49619-0_3","type":"book-chapter","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T08:58:59Z","timestamp":1456477139000},"page":"45-59","source":"Crossref","is-referenced-by-count":3,"title":["Identification of Possible Attack Attempts Against Web Applications Utilizing Collective Assessment of Suspicious Requests"],"prefix":"10.1007","author":[{"given":"Marek","family":"Zachara","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"3_CR1","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s10618-011-0228-8","volume":"24","author":"M Agosti","year":"2012","unstructured":"Agosti, M., Crivellari, F., Di Nunzio, G.: Web log analysis: a review of a decade of studies about information acquisition, inspection and interpretation of user interaction. Data Min. Knowl. Disc. 24(3), 663\u2013696 (2012)","journal-title":"Data Min. Knowl. Disc."},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-39498-0_12","volume-title":"The Economics of Information Security and Privacy","author":"R Anderson","year":"2013","unstructured":"Anderson, R., Barton, C., B\u00f6hme, R., Clayton, R., Van Eeten, M.J., Levi, M., Moore, T., Savage, S.: Measuring the cost of cybercrime. In: B\u00f6hme, R. (ed.) The Economics of Information Security and Privacy, pp. 265\u2013300. Springer, Heidelberg (2013)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Auxilia, M., Tamilselvan, D.: Anomaly detection using negative security model in web application. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), pp. 481\u2013486 (2010)","DOI":"10.1109\/CISIM.2010.5643461"},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-1-4614-1981-5_3","volume-title":"Economics of Information Security and Privacy III","author":"D Flor\u00eancio","year":"2013","unstructured":"Flor\u00eancio, D., Herley, C.: Sex, lies and cyber-crime surveys. In: Schneier, B. (ed.) Economics of Information Security and Privacy III, pp. 35\u201353. Springer, Heidelberg (2013)"},{"issue":"1\u20132","key":"3_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garc\u00eda-Teodoro","year":"2009","unstructured":"Garc\u00eda-Teodoro, P., D\u00edaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/978-3-319-08593-7_8","volume-title":"Trust and Trustworthy Computing","author":"T van Goethem","year":"2014","unstructured":"van Goethem, T., Chen, P., Nikiforakis, N., Desmet, L., Joosen, W.: Large-scale security analysis of the web: challenges and findings. In: Holz, T., Ioannidis, S. (eds.) Trust 2014. LNCS, vol. 8564, pp. 110\u2013126. Springer, Heidelberg (2014)"},{"key":"3_CR7","first-page":"157","volume-title":"Advances in Intelligent Systems and Computing","author":"Ei Ei Han","year":"2015","unstructured":"Han, E.E.: Detection of web application attacks with request length module and regex pattern analysis. In: Genetic and Evolutionary Computing: Proceedings of the Ninth International Conference on Genetic and Evolutionary Computing, 26\u201328 August 2015, Yangon, Myanmar, vol. 2, pp. 157. Springer, Switzerland (2015)"},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/2428556.2428563","volume":"56","author":"P Hyman","year":"2013","unstructured":"Hyman, P.: Cybercrime: it\u2019s serious, but exactly how serious? Commun. ACM 56(3), 18\u201320 (2013)","journal-title":"Commun. ACM"},{"issue":"1","key":"3_CR9","first-page":"77","volume":"3","author":"R Iv\u00e1ncsy","year":"2006","unstructured":"Iv\u00e1ncsy, R., Vajk, I.: Frequent pattern mining in web log data. Acta Polytechnica Hungarica 3(1), 77\u201390 (2006)","journal-title":"Acta Polytechnica Hungarica"},{"key":"3_CR10","unstructured":"JSON: a lightweight data-interchange format. http:\/\/www.json.org"},{"issue":"5","key":"3_CR11","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1016\/j.comnet.2005.01.009","volume":"48","author":"C Kruegel","year":"2005","unstructured":"Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Comput. Netw. 48(5), 717\u2013738 (2005)","journal-title":"Comput. Netw."},{"key":"3_CR12","unstructured":"McAfee: Net Losses: Estimating the Global Cost of Cybercrime (2014). http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-economic-impact-cybercrime2.pdf"},{"key":"3_CR13","unstructured":"Muller, J.: Implementation of a Framework for Advanced HTTPD Logfile Security Analysis, Master\u2019s thesis (2012)"},{"key":"3_CR14","unstructured":"Netcraft: Web Server Survey (2015). http:\/\/news.netcraft.com\/archives\/2013\/11\/01\/november-2013-web-server-survey.html"},{"key":"3_CR15","unstructured":"OWASP: Web Application Firewall. https:\/\/www.owasp.org\/index.php\/Web_Application_Firewall"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-642-23300-5_23","volume-title":"Availability, Reliability and Security for Business, Enterprise and Health Information Systems","author":"D Pa\u0142ka","year":"2011","unstructured":"Pa\u0142ka, D., Zachara, M.: Learning web application firewall - benefits and caveats. In: Tjoa, A.M., Quirchmayr, G., You, I., Xu, L. (eds.) ARES 2011. LNCS, vol. 6908, pp. 295\u2013308. Springer, Heidelberg (2011)"},{"issue":"4","key":"3_CR17","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s11416-006-0030-0","volume":"2","author":"K Rieck","year":"2007","unstructured":"Rieck, K., Laskov, P.: Language models for detection of unknown attacks in network traffic. J. Comput. Virol. 2(4), 243 (2007)","journal-title":"J. Comput. Virol."},{"key":"3_CR18","unstructured":"Roesch, M.: Snort: lightweight intrusion detection for networks. In: LISA, USENIX, pp. 229\u2013238 (1999)"},{"issue":"4","key":"3_CR19","first-page":"p123","volume":"4","author":"SE Salama","year":"2011","unstructured":"Salama, S.E., Marie, M.I., El-Fangary, L.M., Helmy, Y.K.: Web server logs preprocessing for web intrusion detection. Comput. Inf. Sci. 4(4), p123 (2011)","journal-title":"Comput. Inf. Sci."},{"issue":"90","key":"3_CR20","first-page":"26","volume":"2012","author":"M Stevens","year":"2012","unstructured":"Stevens, M.: Advances in hash function cryptanalysis. ERCIM News 2012(90), 26\u201327 (2012)","journal-title":"ERCIM News"},{"key":"3_CR21","unstructured":"Symantec: Internet Security Threat Report (2015). http:\/\/www.symantec.com\/security_response\/publications\/threatreport.jsp"},{"key":"3_CR22","unstructured":"WhiteHat: Website Security Statistics Report (2013). http:\/\/info.whitehatsec.com\/2013-website-security-report.html"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1007\/978-3-319-11289-3_39","volume-title":"Computational Collective Intelligence","author":"M Zachara","year":"2014","unstructured":"Zachara, M.: Collective detection of potentially harmful requests directed at web sites. In: Hwang, D., Jung, J.J., Nguyen, N.-T. (eds.) ICCCI 2014. LNCS, vol. 8733, pp. 384\u2013393. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Collective Intelligence XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49619-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T13:04:45Z","timestamp":1720789485000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-49619-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662496183","9783662496190"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49619-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}