What is it about?

The global usage of more sophisticated web-based application systems is obviously growing very rapidly. Major usage includes the storing and transporting of sensitive data over the Internet. The growth has consequently opened up a serious need for more secured network and application security protection devices. Security experts normally equip their databases with a large number of signatures to help in the detection of known web-based threats. In reality, it is almost impossible to keep updating the database with the newly identified web vulnerabilities. As such, new attacks are invisible.

Featured Image

Why is it important?

This research presents a novel approach of Intrusion Detection System (IDS) in detecting unknown attacks on web servers using the Unified Intrusion Anomaly Detection (UIAD) approach. The unified approach consists of three components (preprocessing, statistical analysis, and classification).

Read the Original

This page is a summary of: A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks, Security and Communication Networks, January 2017, Hindawi Publishing Corporation,
DOI: 10.1155/2017/2539034.
You can read the full text:

Read
Open access logo

Contributors

The following have contributed to this page