[eng] The present work proposes a security architecture for web servers called Web Attacks Cognitive Patterns Classifier, which makes use of cognitive security concepts to deliver a more complete solution than existing ones. The architecture proposes the development of an integrated software solution where existing tools such as Elasticsearch, Logstash and Kibana are incorporated. The proposed system will be nurtured using data of attacks obtained from honeypots implemented in hacker communities; such data will be analyzed by using machine learning algorithms and behavioral parameters to determinate attack patterns and classifications. The present work also makes a literature review of existing web security solutions, to understand their li...
The development of computer networks today has increased rapidly. This can be seen based on the tren...
The field of IoT web applications is facing a range of security risks and system attacks due to the ...
Malware is one of the most common security threats experienced by a user when browsing web pages. A ...
The possibility of applying machine learning for the classification of malicious requests to aWeb ap...
Revised paper from the third International Conference, ICISSP 2017, Porto, Portugal, February 19-21,...
International audienceSecurity at the design stage of the software life cycle can be performed by me...
International audienceDesign Patterns are now widely accepted and used in software engineering ; the...
The number of attacks is increasing day by day, especially the web attacks due to the shift of the m...
Attacks targeting Web system vulnerabilities have shown an increasing trend in the recent past. A co...
In the current technological environment, different entities engage in intricate cyber security appr...
Security is a major concern when web applications are implemented. This has led to the proposal of a...
The development of Internet and social media contributes to multiplying the data produced on the Int...
Abstract: The web is a vast and powerful attack surface that attackers can leverage to accomplish th...
Web applications are computer codes which permit website users to access data from database using In...
AbstractThe Internet can be defined as a global system of interconnected networks (wired/wireless) t...
The development of computer networks today has increased rapidly. This can be seen based on the tren...
The field of IoT web applications is facing a range of security risks and system attacks due to the ...
Malware is one of the most common security threats experienced by a user when browsing web pages. A ...
The possibility of applying machine learning for the classification of malicious requests to aWeb ap...
Revised paper from the third International Conference, ICISSP 2017, Porto, Portugal, February 19-21,...
International audienceSecurity at the design stage of the software life cycle can be performed by me...
International audienceDesign Patterns are now widely accepted and used in software engineering ; the...
The number of attacks is increasing day by day, especially the web attacks due to the shift of the m...
Attacks targeting Web system vulnerabilities have shown an increasing trend in the recent past. A co...
In the current technological environment, different entities engage in intricate cyber security appr...
Security is a major concern when web applications are implemented. This has led to the proposal of a...
The development of Internet and social media contributes to multiplying the data produced on the Int...
Abstract: The web is a vast and powerful attack surface that attackers can leverage to accomplish th...
Web applications are computer codes which permit website users to access data from database using In...
AbstractThe Internet can be defined as a global system of interconnected networks (wired/wireless) t...
The development of computer networks today has increased rapidly. This can be seen based on the tren...
The field of IoT web applications is facing a range of security risks and system attacks due to the ...
Malware is one of the most common security threats experienced by a user when browsing web pages. A ...