{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:25:14Z","timestamp":1775838314187,"version":"3.50.1"},"publisher-location":"New York, New York, USA","reference-count":26,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3368926.3369715","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T13:30:11Z","timestamp":1576848611000},"page":"267-272","source":"Crossref","is-referenced-by-count":8,"title":["Detecting Web Attacks using Stacked Denoising Autoencoder and Ensemble Learning Methods"],"prefix":"10.1145","author":[{"given":"Dung","family":"Truong","sequence":"first","affiliation":[{"name":"Bach Khoa Cybersecurity Centre, HUST Vietnam"}]},{"given":"Duc","family":"Tran","sequence":"additional","affiliation":[{"name":"Bach Khoa Cybersecurity Centre, HUST Vietnam"}]},{"given":"Lam","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Bach Khoa Cybersecurity Centre, HUST Vietnam"}]},{"given":"Hieu","family":"Mac","sequence":"additional","affiliation":[{"name":"Bach Khoa Cybersecurity Centre, HUST Vietnam"}]},{"given":"Hai Anh","family":"Tran","sequence":"additional","affiliation":[{"name":"Bach Khoa Cybersecurity Centre, HUST Vietnam"}]},{"given":"Tung","family":"Bui","sequence":"additional","affiliation":[{"name":"Bach Khoa Cybersecurity Centre, HUST Vietnam"}]}],"member":"320","reference":[{"key":"key-10.1145\/3368926.3369715-1","unstructured":"Guillaume Alain and Yoshua Bengio. 2014. What regularized autoencoders learn from the data-generating distribution. The Journal of Machine Learning Research 15, 1 (2014), 3563--3593."},{"key":"key-10.1145\/3368926.3369715-2","unstructured":"Simon Bennetts. 2013. Owasp zed attack proxy. AppSec USA (2013)."},{"key":"key-10.1145\/3368926.3369715-3","unstructured":"Gaik-Yee Chan, Chien-Sing Lee, and Swee-Huay Heng. 2013. Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks. Journal of Network and Computer Applications 36, 2 (2013), 829--842."},{"key":"key-10.1145\/3368926.3369715-4","unstructured":"Tianqi Chen and Carlos Guestrin. 2016. Xgboost: A scalable tree boosting system. In Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining. ACM, 785--794."},{"key":"key-10.1145\/3368926.3369715-5","unstructured":"Fran&#231;ois Chollet et al. 2015. Keras. https:\/\/keras.io\/."},{"key":"key-10.1145\/3368926.3369715-6","unstructured":"Ryan Dewhurst. 2012. Damn Vulnerable Web Application (DVWA). http:\/\/www.dvwa.co.uk\/\/."},{"key":"key-10.1145\/3368926.3369715-7","unstructured":"Kenneth L Ingham and Hajime Inoue. 2007. Comparing anomaly detection techniques for http. In International Workshop on Recent Advances in Intrusion Detection. Springer, 42--62."},{"key":"key-10.1145\/3368926.3369715-8","unstructured":"Josef Kittler, Mohamad Hatef, Robert PW Duin, and Jiri Matas. 1998. On combining classifiers. IEEE transactions on pattern analysis and machine intelligence 20, 3 (1998), 226--239."},{"key":"key-10.1145\/3368926.3369715-9","unstructured":"Christopher Kruegel, Giovanni Vigna, and William Robertson. 2005. A multi-model approach to the detection of web-based attacks. Computer Networks 48, 5 (2005), 717--738."},{"key":"key-10.1145\/3368926.3369715-10","unstructured":"Jingxi Liang, Wen Zhao, and Wei Ye. 2017. Anomaly-Based Web Attack Detection: A Deep Learning Approach. In Proceedings of the 2017 VI International Conference on Network, Communication and Computing. ACM, 80--85."},{"key":"key-10.1145\/3368926.3369715-11","doi-asserted-by":"crossref","unstructured":"Hieu Mac, Dung Truong, Lam Nguyen, Hoa Nguyen, Hai Anh Tran, and Duc Tran. 2018. Detecting Attacks on Web Applications using Autoencoder. In The 9th International Symposium on Information and Communication Technology (SoICT 2018), Da Nang, Vietnam (2018-12-06).","DOI":"10.1145\/3287921.3287946"},{"key":"key-10.1145\/3368926.3369715-12","unstructured":"Hai Thanh Nguyen, Carmen Torrano-Gimenez, Gonzalo Alvarez, Slobodan Petrovi&#263;, and Katrin Franke. 2011. Application of the generic feature selection measure in detection of web attacks. In Computational Intelligence in Security for Information Systems. Springer, 25--32."},{"key":"key-10.1145\/3368926.3369715-13","unstructured":"Top OWASP. 10. Application Security Risks-2019. Open Web Application Security Project (OWASP)."},{"key":"key-10.1145\/3368926.3369715-14","unstructured":"Yao Pan, Fangzhou Sun, Zhongwei Teng, Jules White, Douglas C Schmidt, Jacob Staples, and Lee Krause. 2019. Detecting web attacks with end-to-end deep learning. Journal of Internet Services and Applications 10, 1 (2019), 1--22."},{"key":"key-10.1145\/3368926.3369715-15","unstructured":"Fabian Pedregosa, Ga&#235;l Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, et al. 2011. Scikit-learn: Machine learning in Python. Journal of machine learning research 12, Oct (2011), 2825--2830."},{"key":"key-10.1145\/3368926.3369715-16","unstructured":"Ofer Shezaf. 2007. ModSecurity Core Rule Set\": An Open Source Rule Set for Generic Detection of Attacks against Web Applications. In OWASP AppSec Conference."},{"key":"key-10.1145\/3368926.3369715-17","unstructured":"Yingbo Song, Angelos D Keromytis, and Salvatore Stolfo. 2009. Spectrogram: A mixture-of-markov-chains model for anomaly detection in web traffic. (2009)."},{"key":"key-10.1145\/3368926.3369715-18","unstructured":"Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Alvarez, and Katrin Franke. 2015. Combining expert knowledge with automatic feature extraction for reliable web attack detection. Security and Communication Networks 8, 16 (2015), 2750--2767."},{"key":"key-10.1145\/3368926.3369715-19","unstructured":"Quang Duc Tran and Panos Liatsis. 2016. RABOC: An approach to handle class imbalance in multimodal biometric authentication. Neurocomputing 188 (2016), 167--177."},{"key":"key-10.1145\/3368926.3369715-20","unstructured":"Ali Moradi Vartouni, Saeed Sedighian Kashi, and Mohammad Teshnehlab. 2018. An anomaly detection method to detect web attacks using Stacked Auto-Encoder. In Fuzzy and Intelligent Systems (CFIS), 2018 6th Iranian Joint Congress on. IEEE, 131--134."},{"key":"key-10.1145\/3368926.3369715-21","unstructured":"Pascal Vincent, Hugo Larochelle, Isabelle Lajoie, Yoshua Bengio, and Pierre-Antoine Manzagol. 2010. Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. Journal of machine learning research 11, Dec (2010), 3371--3408."},{"key":"key-10.1145\/3368926.3369715-22","unstructured":"Jiabao Wang, Zhenji Zhou, and Jun Chen. 2018. Evaluating CNN and LSTM for Web Attack Detection. In Proceedings of the 2018 10th International Conference on Machine Learning and Computing. ACM, 283--287."},{"key":"key-10.1145\/3368926.3369715-23","unstructured":"Ke Wang and Salvatore J Stolfo. 2004. Anomalous payload-based network intrusion detection. In International Workshop on Recent Advances in Intrusion Detection. Springer, 203--222."},{"key":"key-10.1145\/3368926.3369715-24","doi-asserted-by":"crossref","unstructured":"Chen Xing, Li Ma, and Xiaoquan Yang. 2016. Stacked denoise autoencoder based feature extraction and classification for hyper-spectral images. Journal of Sensors 2016 (2016).","DOI":"10.1155\/2016\/3632943"},{"key":"key-10.1145\/3368926.3369715-25","unstructured":"Guiqin Yuan, Bo Li, Yiyang Yao, and Simin Zhang. 2017. A deep learning enabled subspace spectral ensemble clustering approach for web anomaly detection. In Neural Networks (IJCNN), 2017 International Joint Conference on. IEEE, 3896--3903."},{"key":"key-10.1145\/3368926.3369715-26","unstructured":"Quan Zou, Sifa Xie, Ziyu Lin, Meihong Wu, and Ying Ju. 2016. Finding the best classification threshold in imbalanced classification. Big Data Research 5 (2016), 2--8."}],"event":{"name":"the Tenth International Symposium","location":"Hanoi, Ha Long Bay, Viet Nam","acronym":"SoICT 2019","number":"10","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"start":{"date-parts":[[2019,12,4]]},"end":{"date-parts":[[2019,12,6]]}},"container-title":["Proceedings of the Tenth International Symposium on Information and Communication Technology  - SoICT 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368926.3369715","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3369715&ftid=2101289&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:05Z","timestamp":1750204385000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3368926.3369715"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1145\/3368926.3369715","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}