{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T18:49:22Z","timestamp":1724352562557},"reference-count":34,"publisher":"Oxford University Press (OUP)","issue":"2","license":[{"start":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T00:00:00Z","timestamp":1536192000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3,25]]},"DOI":"10.1093\/jigpal\/jzy029","type":"journal-article","created":{"date-parts":[[2018,8,9]],"date-time":"2018-08-09T03:39:39Z","timestamp":1533785979000},"page":"149-159","source":"Crossref","is-referenced-by-count":6,"title":["Protecting the application layer in the public domain with machine learning methods"],"prefix":"10.1093","volume":"27","author":[{"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[{"name":"UTP University of Science and Technology, Bydgoszcz, Poland"}]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"UTP University of Science and Technology, Bydgoszcz, Poland"}]}],"member":"286","published-online":{"date-parts":[[2018,9,6]]},"reference":[{"key":"key\n\t\t\t\t2019032911294315900_C1","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1007\/s12652-015-0283-x","article-title":"Advanced services for critical infrastructures protection","volume":"6","author":"Kozik","year":"2015","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"key\n\t\t\t\t2019032911294315900_C2","article-title":"2017 IBM X-Force Threat Intelligence Index","author":"IBM","year":"2017"},{"key":"key\n\t\t\t\t2019032911294315900_C3","article-title":"7 largest data breaches of 2015","author":"Davis","year":"2015"},{"key":"key\n\t\t\t\t2019032911294315900_C4","volume-title":"Ponemon Institute cost of a data breach study","author":"Ponemon","year":"2016"},{"key":"key\n\t\t\t\t2019032911294315900_C5","article-title":"The Times","volume-title":"Cyber attack promoted on YouTube","author":"Ungoed-Thomas"},{"key":"key\n\t\t\t\t2019032911294315900_C6","article-title":"Ransomware attack healthcare","author":"Mukherjee"},{"key":"key\n\t\t\t\t2019032911294315900_C7","article-title":"Global cyber attack","author":"Wong"},{"key":"key\n\t\t\t\t2019032911294315900_C8","article-title":"Data leakage in healthcare domain","author":"Majdan"},{"key":"key\n\t\t\t\t2019032911294315900_C9","article-title":"RedHack breaches Istanbul administration site, hackers claim to have erased debts","author":"Kovacs","year":"2013"},{"key":"key\n\t\t\t\t2019032911294315900_C10","article-title":"The Hacker News","volume-title":"RedHack hits Istanbul Metropolian Municipality & Sewerage Administration systems","author":"Kumar"},{"key":"key\n\t\t\t\t2019032911294315900_C11","article-title":"Security breach in the servers of the Polish Electoral Commission","author":""},{"key":"key\n\t\t\t\t2019032911294315900_C12","article-title":"Every voter in Philippines exposed","author":"Muncaster"},{"key":"key\n\t\t\t\t2019032911294315900_C13","article-title":"Mass download of Poles\u2019 personal data sparks fears","author":"Radio Poland"},{"key":"key\n\t\t\t\t2019032911294315900_C14","article-title":"CERT Orange Polska, Report 2016","author":"CERT Orange Polska"},{"key":"key\n\t\t\t\t2019032911294315900_C15","article-title":"Turkey\u2019s president Erdogan among 50 million victims of alleged data leak","author":"Degeler","year":"2016"},{"key":"key\n\t\t\t\t2019032911294315900_C16","article-title":"MoD contractor hacked, 831 members of defence community exposed","author":"Martin"},{"key":"key\n\t\t\t\t2019032911294315900_C17","article-title":"Hacker puts 290,000 driver licence records for sale on the dark web stolen from government computers","author":"Murdock","year":"2016"},{"key":"key\n\t\t\t\t2019032911294315900_C18","article-title":"Softpedia News","volume-title":"Anonymous attacks Italian government portals because of gas pipeline project","author":"Cimpanu","year":"2016"},{"key":"key\n\t\t\t\t2019032911294315900_C19","article-title":"DutchNews.nl","volume-title":"Massive data breach at Almelo municipaility","author":"DutchNews.nl","year":"2016"},{"key":"key\n\t\t\t\t2019032911294315900_C20","article-title":"ModSecurity project homepage"},{"key":"key\n\t\t\t\t2019032911294315900_C21","article-title":"PHPIDS project homepage"},{"key":"key\n\t\t\t\t2019032911294315900_C22","article-title":"NAXSI project homepage"},{"key":"key\n\t\t\t\t2019032911294315900_C23","article-title":"NGINX project homepage"},{"key":"key\n\t\t\t\t2019032911294315900_C24","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/948109.948144","article-title":"Anomaly detection of web-based attacks","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security","author":"Kruegel","year":"2003"},{"key":"key\n\t\t\t\t2019032911294315900_C25","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1016\/j.comnet.2006.09.016","article-title":"Learning DFA representations of HTTP for protecting web applications","volume":"51","author":"Ingham","year":"2007","journal-title":"Computer Networks"},{"key":"key\n\t\t\t\t2019032911294315900_C26","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/978-3-642-33338-5_18","article-title":"N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"Hadziosmanovic","year":"2012"},{"key":"key\n\t\t\t\t2019032911294315900_C27","first-page":"144","article-title":"POSEIDON: a 2-tier anomaly-based network intrusion detection system","volume-title":"IWIA 2006: Proceedings 4th IEEE International Workshop on Information Assurance","author":"Bolzoni","year":"2006"},{"key":"key\n\t\t\t\t2019032911294315900_C28","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/11856214_12","article-title":"Anagram: a content anomaly detector resistant to mimicry attack","author":"Wang","year":"2006","journal-title":"Recent Advances in Intrusion Detection"},{"key":"key\n\t\t\t\t2019032911294315900_C29","doi-asserted-by":"crossref","first-page":"864","DOI":"10.1016\/j.comnet.2008.11.011","article-title":"McPAD a multiple classifier system for accurate payload-based anomaly detection","volume":"53","author":"Perdisci","year":"2009","journal-title":"Computer Networks"},{"key":"key\n\t\t\t\t2019032911294315900_C30","doi-asserted-by":"crossref","unstructured":"C. Michal and R.Kozik. Network event correlation and semantic reasoning for federated networks protection system. In Computer Information Systems - Analysis and Technologies. Communications in Computer and Information Science CCIS, N. Chaki and A. Cortesi, eds, pp.48\u201354, Springer, 2011.","DOI":"10.1007\/978-3-642-27245-5_8"},{"key":"key\n\t\t\t\t2019032911294315900_C31","doi-asserted-by":"crossref","unstructured":"C. Michal , R.Kozik, R.Piotrowski, J.Brzostek, and W.Holubowicz. Network events correlation for federated networks protection system. In Towards a Service-Based Internet, LNCS 6994, W. Abramowicz, ed. pp. 100\u2013111, Springer2011.","DOI":"10.1007\/978-3-642-24755-2_9"},{"key":"key\n\t\t\t\t2019032911294315900_C32","doi-asserted-by":"crossref","unstructured":"T. Andrysiak , L.Saganowski, C.Michal, and R.Kozik. Network traffic prediction and anomaly detection based on ARFIMA model. In International Joint Conference SOCO14-CISIS14-ICEUTE14, J. G. de la Puerta et al., eds,Advances in Intelligent Systems and Computing, vol. 229, pp. 545\u2013554, Springer, 2014.","DOI":"10.1007\/978-3-319-07995-0_54"},{"key":"key\n\t\t\t\t2019032911294315900_C33","volume-title":"The HTTP dataset CSIC 2010","author":"Torrano-Gimnez"},{"key":"key\n\t\t\t\t2019032911294315900_C34","first-page":"555","article-title":"The HTTP content segmentation method combined with AdaBoost Classifier for web-layer anomaly detection system","volume-title":"International Joint Conference SOCO\u201916-CISIS\u201916-ICUETE\u201916","author":"Kozik","year":"2016"}],"container-title":["Logic Journal of the IGPL"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/jigpal\/article-pdf\/27\/2\/149\/28246840\/jzy029.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T23:26:52Z","timestamp":1661729212000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jigpal\/article\/27\/2\/149\/5091467"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,6]]},"references-count":34,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,9,6]]},"published-print":{"date-parts":[[2019,3,25]]}},"URL":"https:\/\/doi.org\/10.1093\/jigpal\/jzy029","relation":{},"ISSN":["1367-0751","1368-9894"],"issn-type":[{"value":"1367-0751","type":"print"},{"value":"1368-9894","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2019,4]]},"published":{"date-parts":[[2018,9,6]]}}}