Log-Based Intrusion Detection for Cloud Web Applications Using Machine Learning.
Jaron FontaineChris KapplerAdnan ShahidEli De PoorterPublished in: 3PGCIC (2019)
Keyphrases
- web applications
- intrusion detection
- machine learning
- intrusion detection system
- data mining
- anomaly detection
- network traffic
- network security
- application development
- web services
- detecting anomalous
- application developers
- network intrusion detection
- data mining techniques
- cloud computing
- high detection rate
- network intrusions
- business applications
- web application development
- end users
- web development
- alert correlation
- text mining
- mashup
- unsupervised learning
- text classification
- misuse detection
- information security
- virtual machine
- data analysis
- feature selection
- database
- databases
- network intrusion
- information systems
- association rules
- computational intelligence
- open source
- expectation maximization