{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:27:01Z","timestamp":1743096421970,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811507571"},{"type":"electronic","value":"9789811507588"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-0758-8_1","type":"book-chapter","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T13:47:53Z","timestamp":1571838473000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Web Scanner Detection Based on\u00a0Behavioral Differences"],"prefix":"10.1007","author":[{"given":"Jianming","family":"Fu","sequence":"first","affiliation":[]},{"given":"Lin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yingjun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Guojun","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,24]]},"reference":[{"key":"1_CR1","unstructured":"Imperva. Bot traffic report 2016 [EB\/OL] (2016). \n                  https:\/\/www.incapsula.com\/blog\/bot-traffic-report-2016.html"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Asselin, E., Aguilar-Melchor, C., Jakllari, G.: Anomaly detection for web server log reduction: a simple yet efficient crawling based approach. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 586\u2013590. IEEE (2016)","DOI":"10.1109\/CNS.2016.7860553"},{"key":"1_CR3","unstructured":"Stock, B., Pellegrino, G., Rossow, C., Johns, M., Backes, M.: Hey, you have a problem: on the feasibility of large-scale web vulnerability notification. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 1015\u20131032 (2016)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Kals, S., Kirda, E., Kruegel, C., Jovanovic, N.: SecuBat: a web vulnerability scanner. In: Proceedings of the 15th International Conference on World Wide Web, pp. 247\u2013256. ACM (2006)","DOI":"10.1145\/1135777.1135817"},{"issue":"9","key":"1_CR5","first-page":"186","volume":"34","author":"T Zhao","year":"2008","unstructured":"Zhao, T., Yuliang, L., Liu, J.H., Sun, H., Shi, F.: Web vulnerability detection based on form crawler. Comput. Eng. 34(9), 186\u2013188 (2008)","journal-title":"Comput. Eng."},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/1678-4804-20-4","volume":"20","author":"R Akrout","year":"2014","unstructured":"Akrout, R., Alata, E., Kaaniche, M., Nicomette, V.: An automated black box approach for web vulnerability identification and attack scenario generation. J. Braz. Comput. Soc. 20(1), 4 (2014)","journal-title":"J. Braz. Comput. Soc."},{"key":"1_CR7","unstructured":"Cetin, O., Ganan, C., Korczynski, M., van Eeten, M.: Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning. In: Workshop on the Economy of Information Security (2017)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Stock, B., Pellegrino, G., Li, F., Backes, M., Rossow, C.: Didnt you hear me? Towards more successful web vulnerability notifications (2018)","DOI":"10.14722\/ndss.2018.23171"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/11790853_10","volume-title":"Advances in Data Mining. Applications in Medicine, Web Mining, Marketing, Image and Signal Mining","author":"N Geens","year":"2006","unstructured":"Geens, N., Huysmans, J., Vanthienen, J.: Evaluation of web robot discovery techniques: a benchmarking study. In: Perner, P. (ed.) ICDM 2006. LNCS (LNAI), vol. 4065, pp. 121\u2013130. Springer, Heidelberg (2006). \n                  https:\/\/doi.org\/10.1007\/11790853_10"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-662-07952-2_9","volume-title":"Intelligent Technologies for Information Analysis","author":"PN Tan","year":"2004","unstructured":"Tan, P.N., Kumar, V.: Discovery of web robot sessions based on their navigational patterns. In: Zhong, N., Liu, J. (eds.) Intelligent Technologies for Information Analysis, pp. 193\u2013222. Springer, Heidelberg (2004). \n                  https:\/\/doi.org\/10.1007\/978-3-662-07952-2_9"},{"key":"1_CR11","series-title":"Studies in Classification, Data Analysis, and Knowledge Organization","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/3-540-27373-5_14","volume-title":"New Developments in Classification and Data Analysis","author":"C Bomhardt","year":"2005","unstructured":"Bomhardt, C., Gaul, W., Schmidt-Thieme, L.: Web robot detection - preprocessing web logfiles for robot detection. In: Bock, H.H., et al. (eds.) New Developments in Classification and Data Analysis. Studies in Classification, Data Analysis, and Knowledge Organization, pp. 113\u2013124. Springer, Heidelberg (2005). \n                  https:\/\/doi.org\/10.1007\/3-540-27373-5_14"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-540-72524-4_29","volume-title":"Advances in Data and Web Management","author":"A Stassopoulou","year":"2007","unstructured":"Stassopoulou, A., Dikaiakos, M.D.: A probabilistic reasoning approach for discovering web crawler sessions. In: Dong, G., Lin, X., Wang, W., Yang, Y., Yu, J.X. (eds.) APWeb\/WAIM -2007. LNCS, vol. 4505, pp. 265\u2013272. Springer, Heidelberg (2007). \n                  https:\/\/doi.org\/10.1007\/978-3-540-72524-4_29"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Lu, W.-Z., Yu, S.-Z.: Web robot detection based on hidden Markov model. In: 2006 International Conference on Communications, Circuits and Systems, vol. 3, pp. 1806\u20131810. IEEE (2006)","DOI":"10.1109\/ICCCAS.2006.285024"},{"issue":"5","key":"1_CR14","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1177\/0165551507087237","volume":"34","author":"P Huntington","year":"2008","unstructured":"Huntington, P., Nicholas, D., Jamali, H.R.: Web robot detection in the scholarly information environment. J. Inf. Sci. 34(5), 726\u2013741 (2008)","journal-title":"J. Inf. Sci."},{"key":"1_CR15","unstructured":"Seay. Waf realized scanner recognition, completely resisted hacker scanning [EB\/OL] (2016). \n                  http:\/\/www.freebuf.com\/articles\/web\/16806.html"},{"issue":"2","key":"1_CR16","first-page":"123","volume":"3","author":"X Liu","year":"2017","unstructured":"Liu, X., Fang, Y., Huang, C., Liu, L.: Research of identifying web vulnerability scanner based on finite state machine. J. Inf. Secur. Res. 3(2), 123\u2013128 (2017)","journal-title":"J. Inf. Secur. Res."},{"key":"1_CR17","unstructured":"Jacob, G., Kirda, E., Kruegel, C., Vigna, G.: \n                  \n                    \n                  \n                  $$\\{$$\n                PUBCRAWL\n                  \n                    \n                  \n                  $$\\}$$\n                : protecting users and businesses from crawlers. In: Presented as part of the 21st USENIX Security Symposium (USENIX Security 12), pp. 507\u2013522 (2012)"},{"key":"1_CR18","unstructured":"SEO optimization. Yujian [EB\/OL] (2019). \n                  https:\/\/www.chabug.org\/tools\/655.html"},{"key":"1_CR19","unstructured":"Netsparker Web Application Security Scanner. Sqlmap [EB\/OL] (2019). \n                  https:\/\/sqlmap.org\/"},{"key":"1_CR20","unstructured":"Wpscanteam. Wpscan [EB\/OL] (2019). \n                  https:\/\/github.com\/wpscanteam\/wpscan"},{"key":"1_CR21","unstructured":"Espreto. Wpsploit [EB\/OL] (2019). \n                  https:\/\/github.com\/espreto\/wpsploit"},{"key":"1_CR22","unstructured":"OWASP Project. Dirbrute [EB\/OL] (2019). \n                  https:\/\/github.com\/Xyntax\/DirBrute"},{"key":"1_CR23","unstructured":"Xmendez. Wfuzz [EB\/OL] (2019). \n                  https:\/\/github.com\/xmendez\/wfuzz"},{"issue":"3","key":"1_CR24","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MIS.2005.47","volume":"20","author":"JX Yu","year":"2005","unstructured":"Yu, J.X., Ou, Y., Zhang, C., Zhang, S.: Identifying interesting visitors through web log classification. IEEE Intell. Syst. 20(3), 55\u201359 (2005)","journal-title":"IEEE Intell. Syst."},{"key":"1_CR25","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.procs.2011.07.018","volume":"5","author":"D Stevanovic","year":"2011","unstructured":"Stevanovic, D., Vlajic, N., An, A.: Unsupervised clustering of web sessions to detect malicious and non-malicious website users. Procedia Comput. Sci. 5, 123\u2013131 (2011)","journal-title":"Procedia Comput. Sci."},{"issue":"6","key":"1_CR26","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1111\/exsy.12184","volume":"33","author":"D Doran","year":"2016","unstructured":"Doran, D., Gokhale, S.S.: An integrated method for real time and offline web robot detection. Expert Syst. 33(6), 592\u2013606 (2016)","journal-title":"Expert Syst."},{"key":"1_CR27","unstructured":"OpenResty. Openresty - official site [EB\/OL] (2017). \n                  https:\/\/openresty.org\/en\/"},{"key":"1_CR28","unstructured":"Fuyun. Safedog [EB\/OL] (2018). \n                  http:\/\/www.safedog.cn\/"},{"key":"1_CR29","unstructured":"Trustwave. Modsecurity [EB\/OL] (2019). \n                  https:\/\/modsecurity.org\/"},{"issue":"7","key":"1_CR30","first-page":"1076","volume":"40","author":"S Liang","year":"2003","unstructured":"Liang, S., Li, M., Liang, J., Chen, Z.: An experimental study of response times of web applications. J. Comput. Res. Dev. 40(7), 1076\u20131080 (2003)","journal-title":"J. Comput. Res. Dev."}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Social Networks and Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0758-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T21:07:44Z","timestamp":1571864864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0758-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811507571","9789811507588"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0758-8_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocialSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security and Privacy in Social Networks and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socialsec0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/socialsec2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"http:\/\/nsclab.org\/socialsec2019\/","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}