A platform for research: civil engineering, architecture and urbanism
Prevention and Fighting against Web Attacks through Anomaly Detection Technology. A Systematic Review
Numerous techniques have been developed in order to prevent attacks on web servers. Anomaly detection techniques are based on models of normal user and application behavior, interpreting deviations from the established pattern as indications of malicious activity. In this work, a systematic review of the use of anomaly detection techniques in the prevention and detection of web attacks is undertaken; in particular, we used the standardized method of a systematic review of literature in the field of computer science, proposed by Kitchenham. This method is applied to a set of 88 papers extracted from a total of 8041 reviewed papers, which have been published in notable journals. This paper discusses the process carried out in this systematic review, as well as the results and findings obtained to identify the current state of the art of web anomaly detection.
Prevention and Fighting against Web Attacks through Anomaly Detection Technology. A Systematic Review
Numerous techniques have been developed in order to prevent attacks on web servers. Anomaly detection techniques are based on models of normal user and application behavior, interpreting deviations from the established pattern as indications of malicious activity. In this work, a systematic review of the use of anomaly detection techniques in the prevention and detection of web attacks is undertaken; in particular, we used the standardized method of a systematic review of literature in the field of computer science, proposed by Kitchenham. This method is applied to a set of 88 papers extracted from a total of 8041 reviewed papers, which have been published in notable journals. This paper discusses the process carried out in this systematic review, as well as the results and findings obtained to identify the current state of the art of web anomaly detection.
Prevention and Fighting against Web Attacks through Anomaly Detection Technology. A Systematic Review
Tomás Sureda Riera (author) / Juan-Ramón Bermejo Higuera (author) / Javier Bermejo Higuera (author) / José-Javier Martínez Herraiz (author) / Juan-Antonio Sicilia Montalvo (author)
2020
Article (Journal)
Electronic Resource
Unknown
Metadata by DOAJ is licensed under CC BY-SA 1.0
Bridge management through digital twin-based anomaly detection systems: A systematic review
DOAJ | 2023
|DOAJ | 2022
|Mine fire prevention and fighting
Engineering Index Backfile | 1930
|