It is well-established that machine learning techniques have been used with great success in other domains and has been leveraged to deal with sources of evolving abuse, such as spam. This study aims to determine whether machine learning techniques can be used to create a model that detects vulnerability scanning attacks using proprietary real-world data collected from tCell, a web application firewall. In this context, a vulnerability scanning attack is defined as an automated process that detects and classifies security weaknesses and flaws in the web application. To test the hypothesis that machine learning techniques can be used to create a detection model, twenty four models were trained. The models showed a high level of precision and...
Angrep på web baserte applikasjoner og skyleverandører er en økende trussel. En av angrepsvektorene ...
Bug bounties are an increasingly popular way of performing penetration tests of web applications. Us...
Illegitimate acquisition and use of data is a problematic issue faced by many organizations operatin...
It is well-established that machine learning techniques have been used with great success in other d...
Broken Access Control is the most serious web application security risk as published by Open Worldwi...
Etter hvert som flere og flere tjenester flytter online, er internettet blitt en lukrativ plass for ...
Påvisning av sårbarheter er ikke er nytt tema, men de siste årene har det bare blitt viktigere. Ette...
Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems a...
The first detected computer virus commenced in the 1970s. Since then, malware infections have grown ...
Cyber security is an emerging field in the IT-sector. As more devices are connected to the internet, ...
Today, malware authors not only write malicious software but also employ obfuscation, polymorphism, ...
Having a proper method of defense against attacks is crucial for web applications to ensure the safe...
As businesses use more digital services connected to the internet, these services and systems become...
With the transition from traditional media and the increasing number of digital devices, the threats...
With the advent of the digital era there has been an exponential increase in complex cyber systems.A...
Angrep på web baserte applikasjoner og skyleverandører er en økende trussel. En av angrepsvektorene ...
Bug bounties are an increasingly popular way of performing penetration tests of web applications. Us...
Illegitimate acquisition and use of data is a problematic issue faced by many organizations operatin...
It is well-established that machine learning techniques have been used with great success in other d...
Broken Access Control is the most serious web application security risk as published by Open Worldwi...
Etter hvert som flere og flere tjenester flytter online, er internettet blitt en lukrativ plass for ...
Påvisning av sårbarheter er ikke er nytt tema, men de siste årene har det bare blitt viktigere. Ette...
Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems a...
The first detected computer virus commenced in the 1970s. Since then, malware infections have grown ...
Cyber security is an emerging field in the IT-sector. As more devices are connected to the internet, ...
Today, malware authors not only write malicious software but also employ obfuscation, polymorphism, ...
Having a proper method of defense against attacks is crucial for web applications to ensure the safe...
As businesses use more digital services connected to the internet, these services and systems become...
With the transition from traditional media and the increasing number of digital devices, the threats...
With the advent of the digital era there has been an exponential increase in complex cyber systems.A...
Angrep på web baserte applikasjoner og skyleverandører er en økende trussel. En av angrepsvektorene ...
Bug bounties are an increasingly popular way of performing penetration tests of web applications. Us...
Illegitimate acquisition and use of data is a problematic issue faced by many organizations operatin...