Intrusion detection in web applications using text mining, Engineering Applications of Artificial Intelligence, vol.20, issue.4, pp.555-566, 2007. ,
DOI : 10.1016/j.engappai.2006.09.001
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications, Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), pp.63-86, 2007. ,
DOI : 10.1007/978-3-540-74320-0_4
An intrusion-detection model, IEEE Transactions on Software Engineering, vol.13, issue.2, pp.222-232, 1987. ,
Apache http server documentation, 2007. ,
Anomaly detection of webbased attacks, 10th ACM Conference on Computer and Communications Security (CCS), 2003. ,
A multimodel approach to the detection of web-based attacks, Computer Networks: The International Journal of Computer and Telecommunications Networking, vol.48, issue.5, pp.717-738, 2005. ,
Uniform resource locator, 1994. ,
Real time data mining-based intrusion detection. DARPA Information Survivability Conference & Exposition II, DISCEX '01. Proceedings, pp.89-100, 2001. ,
A hierarchical characterization of user behavior, WebMedia and LA-Web, 2004. Proceedings, pp.2-9, 2007. ,
DOI : 10.1109/WEBMED.2004.1348138
Data mining and machine learning???Towards reducing false positives in intrusion detection, Information Security Technical Report, vol.10, issue.3, 2005. ,
DOI : 10.1016/j.istr.2005.07.001
Using generalization and characterization techniques in the anomaly-based detection of web attacks, Proceedings of Network and Distributed System Security Symposium Conference, Internet Society, 2006. ,
Intrusion detection via static analysis, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, p.156, 2001. ,
DOI : 10.1109/SECPRI.2001.924296
Host-based intrusion detection using dynamic and static behavioral models, Pattern Recognition, vol.36, issue.1, pp.229-243, 2003. ,
DOI : 10.1016/S0031-3203(02)00026-2