[1] Adeva J J G, Atxa J M P. Intrusion detection in Web applications using text mining[J]. Engineering Applications of Artificial Intelligence, 2007, 20(4): 555-566.
[2] Almgren M, Debar H, Dacier M. A Lightweight Tool for Detecting Web Server Attacks[C]// Proceedings of Network and Distribu-ted Systems Security.2000:157-170.
[3] 何鹏程, 方勇. 一种基于Web日志和网站参数的入侵检测和风险评估模型的研究[J]. 信息网络安全, 2015(1):61-65.
[4] 吴少华, 程书宝, 胡勇. 基于SVM的Web攻击检测技术[J]. 计算机科学, 2015, 42(s1):362-364.
[5] 张伟, 巢翌, 甘志强, 等. 结合特征分析和 Svm 优化的 Web 入侵检测系统[J]. 计算机仿真, 2018 (2018 年 05): 406-409,447.
[6] Vishnu B A, Jevitha K P. Prediction of cross-site scripting attack using machine learning algorithms[C]//Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing. ACM, 2014: 55.
[7] Rathore S, Sharma P K, Park J H, et al. XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs[J]. Journal of Information Processing Systems, 2017, 13(4).
[8] Nelms T, Perdisci R, Ahamad M. ExecScent: mining for new C&C domains in live networks with adaptive control protocol templates[C]// Usenix Conference on Security. 2013:589-604.
[9] Fang Y, Li Y, Liu L, et al. DeepXSS: Cross Site Scripting Detection Based on Deep Learning[C]//Proceedings of the 2018 International Conference on Computing and Artificial Intelligence. ACM, 2018: 47-51.
[10] Salton G, Buckley C. Term-weighting approaches in automatic text retrieval[J]. Information Processing & Management, 1987, 24(5):513-523.
[11] Breiman L. Random Forests[J]. Machine Learning, 2001, 45(1):5-32.
[12] Giménez C T, Villegas A P, Marañón G Á. HTTP data set CSIC 2010 [EB/OL]. (2012-01-20) [2018-09-20]. http://www.isi.csic.es/dataset
[13] Machine Learning algorithms and training/testing data [EB/OL]. (2016-06-24) [2018-09-20]. https://github.com/jeonglee/ML
[14] DMOZ: The Open Directory Project [EB/OL]. [2018-09-20]. http://www.dmoztools.net
[15] Pedregosa F, Gramfort A, Michel V, et al. Scikit-learn: MachineLearning in Python[J]. Journal of Machine Learning Research, 2013, 12(10):2825-2830.
|