{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T17:20:32Z","timestamp":1758820832357,"version":"3.37.3"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T00:00:00Z","timestamp":1660694400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T00:00:00Z","timestamp":1660694400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-022-01327-2","type":"journal-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T15:03:00Z","timestamp":1660748580000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Improving Web Application Firewalls with Automatic Language Detection"],"prefix":"10.1007","volume":"3","author":[{"given":"Tri-Chan-Hung","family":"Nguyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Minh-Khoi","family":"Le-Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dinh-Thuan","family":"Le","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Van-Hoa","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Long-Phuoc","family":"T\u00f4n","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9910-6387","authenticated-orcid":false,"given":"Khuong","family":"Nguyen-An","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,8,17]]},"reference":[{"key":"1327_CR1","doi-asserted-by":"publisher","unstructured":"Betarte G, Gim\u00e9nez E, Martinez R, Pardo \u00c1. Improving web application firewalls through anomaly detection. In: 17th IEEE International Conference on machine learning and applications, ICMLA, 2018; pp. 779\u2013784. IEEE, Orlando, FL, USA. https:\/\/doi.org\/10.1109\/ICMLA.2018.00124.","DOI":"10.1109\/ICMLA.2018.00124"},{"key":"1327_CR2","doi-asserted-by":"publisher","unstructured":"Nguyen T, Le-Nguyen M, Le D, Nguyen V, T\u00f4n L, Nguyen-An K. Improving modsecurity WAF using a structured-language classifier. In: Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. Communications in Computer and Information Science, 2021; vol. 1500, pp. 89\u2013104. Springer, Ho Chi Minh City, Vietnam. https:\/\/doi.org\/10.1007\/978-981-16-8062-5_6.","DOI":"10.1007\/978-981-16-8062-5_6"},{"key":"1327_CR3","doi-asserted-by":"publisher","unstructured":"Boukhtouta A, Lakhdari N, Mokhov S.A, Debbabi M. Towards fingerprinting malicious traffic. In: Proceedings of the 4th International Conference on ambient systems, networks and technologies\u2014ANT, the 3rd International Conference on sustainable energy information technology (SEIT). Procedia Computer Science, 2013; vol. 19, pp. 548\u2013555. Elsevier, Halifax, Nova Scotia, Canada. https:\/\/doi.org\/10.1016\/j.procs.2013.06.073.","DOI":"10.1016\/j.procs.2013.06.073"},{"issue":"5","key":"1327_CR4","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.3390\/s20051452","volume":"20","author":"M Gao","year":"2020","unstructured":"Gao M, Ma L, Liu H, Zhang Z, Ning Z, Xu J. Malicious network traffic detection based on deep neural networks and association analysis. Sensors. 2020;20(5):1452. https:\/\/doi.org\/10.3390\/s20051452.","journal-title":"Sensors"},{"key":"1327_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.7125\/40.6","volume":"40","author":"K Shinomiya","year":"2015","unstructured":"Shinomiya K, Goto S. Detecting malicious traffic through two-phase machine learning. Proc Asia-Pac Adv Netw. 2015;40:34. https:\/\/doi.org\/10.7125\/40.6.","journal-title":"Proc Asia-Pac Adv Netw"},{"key":"1327_CR6","unstructured":"Radford BJ, Apolonio LM, Trias AJ, Simpson JA. Network traffic anomaly detection using recurrent neural networks. 2018. arXiv:1803.10769 [CoRR]."},{"key":"1327_CR7","doi-asserted-by":"crossref","unstructured":"Marin G, Casas P, Capdehourat G. Deepmal\u2014deep learning models for malware traffic detection and classification. 2020. arXiv:2003.04079 [CoRR].","DOI":"10.1007\/978-3-658-32182-6_16"},{"key":"1327_CR8","doi-asserted-by":"publisher","first-page":"3414","DOI":"10.3390\/app9163414","volume":"9","author":"R-H Hwang","year":"2019","unstructured":"Hwang R-H, Peng M-C, Nguyen V-L, Chang Y-L. An lstm-based deep learning approach for classifying malicious traffic at the packet level. Appl Sci. 2019;9:3414. https:\/\/doi.org\/10.3390\/app9163414.","journal-title":"Appl. Sci."},{"key":"1327_CR9","unstructured":"Mikolov T, Yih W, Zweig G. Linguistic regularities in continuous space word representations. In: Human language technologies: Proceedings of the Conference of the North American Chapter, 2013; pp. 746\u2013751. The Association for Computational Linguistics, ???."},{"key":"1327_CR10","doi-asserted-by":"publisher","unstructured":"Zhang M, Xu B, Bai S, Lu S, Lin Z. A deep learning method to detect web attacks using a specially designed CNN. In: Neural Information Processing\u201424th International Conference, ICONIP, Part V. Lecture Notes in Computer Science, 2017; vol. 10638, pp. 828\u2013836. Springer, Guangzhou, China. https:\/\/doi.org\/10.1007\/978-3-319-70139-4_84.","DOI":"10.1007\/978-3-319-70139-4_84"},{"key":"1327_CR11","doi-asserted-by":"publisher","unstructured":"Tran N, Nguyen V, Nguyen-Le T, Nguyen-An K. Improving modsecurity WAF with machine learning methods. In: Proceedings of Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications - 7th International Conference, FDSE. Communications in Computer and Information Science, 2020; vol. 1306, pp. 93\u2013107. Springer, Quy Nhon, Vietnam. https:\/\/doi.org\/10.1007\/978-981-33-4370-2_7.","DOI":"10.1007\/978-981-33-4370-2_7"},{"key":"1327_CR12","doi-asserted-by":"publisher","unstructured":"Pennington J, Socher R, Manning CD. Glove: global vectors for word representation. In: Proceedings of the Conference on empirical methods in natural language processing, 2014; pp. 1532\u20131543. ACL, Doha, Qatar. https:\/\/doi.org\/10.3115\/v1\/d14-1162.","DOI":"10.3115\/v1\/d14-1162"},{"key":"1327_CR13","unstructured":"Kingma DP, Ba J. Adam: a method for stochastic optimization. In: Proceedings of the 3rd International Conference on learning representations\u2014ICLR 2015; pp. 1\u201315."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01327-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-022-01327-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01327-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T21:57:28Z","timestamp":1668031048000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-022-01327-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,17]]},"references-count":13,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2022,11]]}},"alternative-id":["1327"],"URL":"https:\/\/doi.org\/10.1007\/s42979-022-01327-2","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2022,8,17]]},"assertion":[{"value":"15 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"446"}}