A survey of anomaly detection using data mining methods for hypertext transfer protocol web services
In contrast to traditional Intrusion Detection Systems (IDSs), data mining anomaly detection methods/techniques has been widely used in the domain of network traffic data for intrusion detection and cyber threat. Data mining is widely recognized as popular and important intelligent and automatic too...
| Main Authors: | Kakavand, Mohsen, Mustapha, Norwati, Mustapha, Aida, Abdullah, Mohd Taufik, Riahi, Hamed |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publications
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/43614/ http://psasir.upm.edu.my/id/eprint/43614/1/A%20survey%20of%20anomaly%20detection%20using%20data%20mining%20methods%20for%20hypertext%20transfer%20protocol%20web%20services.pdf |
Similar Items
Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload
by: Kakavand, Mohsen, et al.
Published: (2016)
by: Kakavand, Mohsen, et al.
Published: (2016)
Information extraction from hypertext mark-up language Web pages.
by: Shaker, Mahmoud, et al.
Published: (2009)
by: Shaker, Mahmoud, et al.
Published: (2009)
Position score weighting technique for mining web content outliers.
by: Mustapha, Norwati, et al.
Published: (2013)
by: Mustapha, Norwati, et al.
Published: (2013)
Classic term weighting technique for mining web content outliers
by: Wan Zulkifeli, Wan Rusila, et al.
Published: (2012)
by: Wan Zulkifeli, Wan Rusila, et al.
Published: (2012)
Preliminary analysis of malware detection in opcode sequences within IoT environment
by: Ahmed, Firas Shihab, et al.
Published: (2020)
by: Ahmed, Firas Shihab, et al.
Published: (2020)
A Survey On UTM TESL Undergraduates’ Reading Preference: Between Hypertexts And Books
by: Abdul Samad , Adlina, et al.
Published: (2010)
by: Abdul Samad , Adlina, et al.
Published: (2010)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Improved web page recommender system based on web usage mining
by: Almurtadha, Yahya Mohammed, et al.
Published: (2011)
by: Almurtadha, Yahya Mohammed, et al.
Published: (2011)
Expectation maximization clustering algorithm for user modeling in web usage mining system
by: Mustapha, Norwati, et al.
Published: (2009)
by: Mustapha, Norwati, et al.
Published: (2009)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Mining web navigation profiles for recommendation systems
by: AlMurtadha, Yahya M., et al.
Published: (2010)
by: AlMurtadha, Yahya M., et al.
Published: (2010)
Empowering Human Cognitive Activity through Hypertext Technology
by: Dreher, Heinz
Published: (1997)
by: Dreher, Heinz
Published: (1997)
Frequent Lexicographic Algorithm for Mining Association Rules
by: Mustapha, Norwati
Published: (2005)
by: Mustapha, Norwati
Published: (2005)
Web user navigation pattern mining approach based on graph partitioning algorithm.
by: Jalali, Mehrdad, et al.
Published: (2008)
by: Jalali, Mehrdad, et al.
Published: (2008)
A Comparative Study Of The Printed And Hypertext Novel 10:01
by: Ladan, Modir
Published: (2015)
by: Ladan, Modir
Published: (2015)
NgramPOS a bigram-based linguistic and statistical feature process model for unstructured text classification
by: Yazdani, Sepideh Foroozan, et al.
Published: (2018)
by: Yazdani, Sepideh Foroozan, et al.
Published: (2018)
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
by: Jalali, Mehrdad, et al.
Published: (2008)
by: Jalali, Mehrdad, et al.
Published: (2008)
Intrusion detection system with data mining approach: a review
by: Khalilian, Majdid, et al.
Published: (2011)
by: Khalilian, Majdid, et al.
Published: (2011)
"An infinitude of Possible Worlds": towards a research method for hypertext fiction
by: Jordan, Spencer
Published: (2014)
by: Jordan, Spencer
Published: (2014)
A systematic review of machine learning and deep learning techniques for anomaly detection in data mining
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Conquest XHTML: a programers guide to extensible HyperText Markup Language
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
A Comparative Study Of The Printed And Hypertext Novel 10:01
By Lance Olsen
by: Modir, Ladan
Published: (2015)
by: Modir, Ladan
Published: (2015)
A Comparative Study Of The Printed
And Hypertext Novel 10:01
By Lance Olsen
by: Modir, Ladan
Published: (2015)
by: Modir, Ladan
Published: (2015)
Dempster-Shafer for Anomaly Detection
by: Chen, Qi, et al.
Published: (2006)
by: Chen, Qi, et al.
Published: (2006)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Detection of Cross-Channel Anomalies
by: Pham, DucSon, et al.
Published: (2012)
by: Pham, DucSon, et al.
Published: (2012)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Hypertext Complements Print? A Study Of Narrative Reconfiguration In Geoff Ryman's Novel 253
by: Ling, Chung Guan
Published: (2011)
by: Ling, Chung Guan
Published: (2011)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Anomaly detection for vision-based inspection
by: Chew, Yan Zhe
Published: (2022)
by: Chew, Yan Zhe
Published: (2022)
Host-based packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2013)
by: Yassin, Warusia, et al.
Published: (2013)
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
Term frequency-information content for focused crawling to predict relevant web pages.
by: Pesaranghader, Ali, et al.
Published: (2013)
by: Pesaranghader, Ali, et al.
Published: (2013)
Mine Surveying
by: Jarosz, Andrew
Published: (2011)
by: Jarosz, Andrew
Published: (2011)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Generative Models for Anomaly Detection and Its Applications
by: Yu, Jongmin
Published: (2020)
by: Yu, Jongmin
Published: (2020)
Anomaly Detection Framework for PingER Data
by: Danny Wilson, Mandai, et al.
Published: (2015)
by: Danny Wilson, Mandai, et al.
Published: (2015)
Anomaly detection with Attention-based deep autoencoder
by: Yong, Hong Long
Published: (2022)
by: Yong, Hong Long
Published: (2022)
The application of automated mine survey systems to mine surveying practice
by: Ketteman, Mark Robert
Published: (1985)
by: Ketteman, Mark Robert
Published: (1985)
Similar Items
-
Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload
by: Kakavand, Mohsen, et al.
Published: (2016) -
Information extraction from hypertext mark-up language Web pages.
by: Shaker, Mahmoud, et al.
Published: (2009) -
Position score weighting technique for mining web content outliers.
by: Mustapha, Norwati, et al.
Published: (2013) -
Classic term weighting technique for mining web content outliers
by: Wan Zulkifeli, Wan Rusila, et al.
Published: (2012) -
Preliminary analysis of malware detection in opcode sequences within IoT environment
by: Ahmed, Firas Shihab, et al.
Published: (2020)