{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:50Z","timestamp":1750219730275,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T00:00:00Z","timestamp":1686700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,14]]},"DOI":"10.1145\/3590777.3590788","type":"proceedings-article","created":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T10:11:40Z","timestamp":1685182300000},"page":"65-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4809-5654","authenticated-orcid":false,"given":"Agust\u00edn Walabonso","family":"Lara Romero","sequence":"first","affiliation":[{"name":"Escuela T\u00e9cnica Superior de Ingenier\u00eda. Dept. Ingenier\u00eda Telem\u00e1tica, University of Seville, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3007-7570","authenticated-orcid":false,"given":"Juan Antonio","family":"Ternero Mu\u00f1iz","sequence":"additional","affiliation":[{"name":"Escuela T\u00e9cnica Superior de Ingenier\u00eda. Dept. Ingenier\u00eda Telem\u00e1tica, University of Seville, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8505-1920","authenticated-orcid":false,"given":"Rafael","family":"Estepa Alonso","sequence":"additional","affiliation":[{"name":"Escuela T\u00e9cnica Superior de Ingenier\u00eda. Dept. Ingenier\u00eda Telem\u00e1tica, University of Seville, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1841-3973","authenticated-orcid":false,"given":"Antonio","family":"Estepa Alonso","sequence":"additional","affiliation":[{"name":"Escuela T\u00e9cnica Superior de Ingenier\u00eda. Dept. Ingenier\u00eda Telem\u00e1tica, University of Seville, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2848-2136","authenticated-orcid":false,"given":"Fernando","family":"Ruiz Robles","sequence":"additional","affiliation":[{"name":"Escuela T\u00e9cnica Superior de Ingenier\u00eda. Dept. Ingenier\u00eda Telem\u00e1tica, University of Seville, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8424-9932","authenticated-orcid":false,"given":"Jes\u00fas","family":"D\u00edaz-Verdejo","sequence":"additional","affiliation":[{"name":"E.T.S. de Ingenier\u00edas Inform\u00e1tica y de Telecomunicaci\u00f3n.Departamento de Teor\u00eda de la Se\u00f1al, Telem\u00e1tica y Comunicaciones, University of Granada, Spain"}]}],"member":"320","published-online":{"date-parts":[[2023,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"F. Ahmad Timo A. Bilge and Ullah M.Y.2017. Fwaf-Machine-Learning-driven-Web-Application-Firewall \u00b7 github. https:\/\/github.com\/faizann24\/Fwaf-Machine-Learning-driven-Web-Application-Firewall  F. Ahmad Timo A. Bilge and Ullah M.Y.2017. Fwaf-Machine-Learning-driven-Web-Application-Firewall \u00b7 github. https:\/\/github.com\/faizann24\/Fwaf-Machine-Learning-driven-Web-Application-Firewall"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"e_1_3_2_1_3_1","article-title":"Evaluation measures for models assessment over imbalanced data sets","volume":"3","author":"Bekkar M.","year":"2013","unstructured":"M. Bekkar , H.\u00a0 K. Djemaa , and T.A. Alitouche . 2013 . Evaluation measures for models assessment over imbalanced data sets . J Inf Eng Appl 3 , 10 (2013). M. Bekkar, H.\u00a0K. Djemaa, and T.A. Alitouche. 2013. Evaluation measures for models assessment over imbalanced data sets. J Inf Eng Appl 3, 10 (2013).","journal-title":"J Inf Eng Appl"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"J. D\u00edaz-Verdejo J. Mu\u00f1oz-Calle A. Estepa\u00a0Alonso R. Estepa\u00a0Alonso and G. Madinabeitia. 2022. On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks. Applied Sciences 12 2 (2022).  J. D\u00edaz-Verdejo J. Mu\u00f1oz-Calle A. Estepa\u00a0Alonso R. Estepa\u00a0Alonso and G. Madinabeitia. 2022. On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks. Applied Sciences 12 2 (2022).","DOI":"10.3390\/app12020852"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.033"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"J.E. D\u00edaz-Verdejo R. Estepa\u00a0Alonso A. Estepa\u00a0Alonso and G. Madinabeitia. 2023. A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy limitations and open challenges. Computers & Security 124 (2023).  J.E. D\u00edaz-Verdejo R. Estepa\u00a0Alonso A. Estepa\u00a0Alonso and G. Madinabeitia. 2023. A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy limitations and open challenges. Computers & Security 124 (2023).","DOI":"10.1016\/j.cose.2022.102997"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977591"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.007"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.05.014"},{"volume-title":"2021 IFIP\/IEEE Int. Symp. on Integrated Network Management (IM). 980\u2013985","author":"Hus\u00e1k M.","key":"e_1_3_2_1_10_1","unstructured":"M. Hus\u00e1k , G. Apruzzese , S.J. Yang , and G. Werner . 2021. Towards an efficient detection of pivoting activity . In 2021 IFIP\/IEEE Int. Symp. on Integrated Network Management (IM). 980\u2013985 . M. Hus\u00e1k, G. Apruzzese, S.J. Yang, and G. Werner. 2021. Towards an efficient detection of pivoting activity. In 2021 IFIP\/IEEE Int. Symp. on Integrated Network Management (IM). 980\u2013985."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"K. Hwang M. Cai Y. Chen and M. Qin. 2007. Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes. IEEE Transactions on Dependable and Secure Computing (2007) 41\u201355.  K. Hwang M. Cai Y. Chen and M. Qin. 2007. Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes. IEEE Transactions on Dependable and Secure Computing (2007) 41\u201355.","DOI":"10.1109\/TDSC.2007.9"},{"volume-title":"2017 IEEE 31st Int. Conf. on Advanced Information Networking and Applications (AINA). 1169\u20131176","author":"Khan Z.A.","key":"e_1_3_2_1_12_1","unstructured":"Z.A. Khan and P. Herrmann . 2017. A trust based distributed intrusion detection mechanism for internet of things . In 2017 IEEE 31st Int. Conf. on Advanced Information Networking and Applications (AINA). 1169\u20131176 . Z.A. Khan and P. Herrmann. 2017. A trust based distributed intrusion detection mechanism for internet of things. In 2017 IEEE 31st Int. Conf. on Advanced Information Networking and Applications (AINA). 1169\u20131176."},{"key":"e_1_3_2_1_13_1","volume-title":"F. and D\u00edaz-Verdejo, J.,.","author":"Ternero A.","year":"2023","unstructured":"Lara, A. and Ternero , J . and A. Estepa, and R. Estepa, and Ruiz , F. and D\u00edaz-Verdejo, J.,. 2023 . DIT - Public \/ HTTP Cyberattacks Detection through Dynamic Signatures Supplemental Material . https:\/\/gitlab.com\/dit-public\/http-cyberattacks-detection-through-dynamic-signatures-supplemental-material Lara, A. and Ternero, J. and A. Estepa, and R. Estepa, and Ruiz, F. and D\u00edaz-Verdejo, J.,. 2023. DIT - Public \/ HTTP Cyberattacks Detection through Dynamic Signatures Supplemental Material. https:\/\/gitlab.com\/dit-public\/http-cyberattacks-detection-through-dynamic-signatures-supplemental-material"},{"volume-title":"2020 IEEE Int. Conf. on Communications Workshops. 1\u20136.","author":"Nakagawa Y.","key":"e_1_3_2_1_14_1","unstructured":"Y. Nakagawa , Y. Kazato , and Y. Nakatani . 2020. Inspecting Intrusion Prevention System Signatures for False Blocking using Set Theory . In 2020 IEEE Int. Conf. on Communications Workshops. 1\u20136. Y. Nakagawa, Y. Kazato, and Y. Nakatani. 2020. Inspecting Intrusion Prevention System Signatures for False Blocking using Set Theory. In 2020 IEEE Int. Conf. on Communications Workshops. 1\u20136."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09589-6"},{"key":"e_1_3_2_1_16_1","volume-title":"Simulating Exploits for the Creation and Refinement of Detection Signatures. In IEEE 25th Int. Symp. MASCOSTS. 150\u2013156","author":"Valgenti C.","year":"2010","unstructured":"V.\u00a0 C. Valgenti , Y.\u00a0 W. Lin , A. Suzuki , and M.\u00a0 S. Kim . 2010 . Simulating Exploits for the Creation and Refinement of Detection Signatures. In IEEE 25th Int. Symp. MASCOSTS. 150\u2013156 . V.\u00a0C. Valgenti, Y.\u00a0W. Lin, A. Suzuki, and M.\u00a0S. Kim. 2010. Simulating Exploits for the Creation and Refinement of Detection Signatures. In IEEE 25th Int. Symp. MASCOSTS. 150\u2013156."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.07.013"}],"event":{"name":"EICC 2023: European Interdisciplinary Cybersecurity Conference","acronym":"EICC 2023","location":"Stavanger Norway"},"container-title":["European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590777.3590788","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:26Z","timestamp":1750178186000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590777.3590788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,14]]},"references-count":17,"alternative-id":["10.1145\/3590777.3590788","10.1145\/3590777"],"URL":"https:\/\/doi.org\/10.1145\/3590777.3590788","relation":{},"subject":[],"published":{"date-parts":[[2023,6,14]]},"assertion":[{"value":"2023-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}