{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:57:40Z","timestamp":1743040660755,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811590306"},{"type":"electronic","value":"9789811590313"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9031-3_2","type":"book-chapter","created":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T07:04:29Z","timestamp":1601017469000},"page":"20-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Web Anomaly Detection Approach Based on Semantic Structure"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9740-0654","authenticated-orcid":false,"given":"Zishuai","family":"Cheng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Junsong","family":"Fu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,9,22]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Adhyaru, R.P.: Techniques for attacking web application security. Int. J. Inf. 6(1\/2), (2016)","DOI":"10.5121\/ijist.2016.6205"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Alonso, G., Casati, F., Kuno, H., Machiraju, V.: Web services. In: Web Services, pp. 123\u2013149. Springer (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-662-10876-5_5","DOI":"10.1007\/978-3-662-10876-5_5"},{"issue":"4","key":"2_CR3","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.cose.2010.12.004","volume":"30","author":"D Ariu","year":"2011","unstructured":"Ariu, D., Tronci, R., Giacinto, G.: HMMPayl an intrusion detection system based on hidden Markov models. Comput. Secur. 30(4), 221\u2013241 (2011)","journal-title":"Comput. Secur."},{"issue":"4","key":"2_CR4","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.cose.2004.01.006","volume":"23","author":"S Cho","year":"2004","unstructured":"Cho, S., Cha, S.: Sad: web session anomaly detection based on parameter estimation. Comput. Secur. 23(4), 312\u2013319 (2004)","journal-title":"Comput. Secur."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Corona, I., Ariu, D., Giacinto, G.: Hmm-web: a framework for the detection of attacks against web applications. In: 2009 IEEE International Conference on Communications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/ICC.2009.5199054"},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1504\/IJHPCN.2018.094367","volume":"12","author":"B Cui","year":"2018","unstructured":"Cui, B., He, S., Yao, X., Shi, P.: Malicious URL detection with feature extraction based on machine learning. Int. J. High Perform. Comput. Netw. 12(2), 166\u2013178 (2018)","journal-title":"Int. J. High Perform. Comput. Netw."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Cui, M., Hu, S.: Search engine optimization research for website promotion. In: 2011 International Conference of Information Technology, Computer Engineering and Management Sciences, vol. 4, pp. 100\u2013103. IEEE (2011)","DOI":"10.1109\/ICM.2011.308"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"2","author":"DE Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Trans. Software Eng. 2, 222\u2013232 (1987)","journal-title":"IEEE Trans. Software Eng."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Fan, W.K.G.: An adaptive anomaly detection of web-based attacks. In: 2012 7th International Conference on Computer Science & Education (ICCSE), pp. 690\u2013694. IEEE (2012)","DOI":"10.1109\/ICCSE.2012.6295168"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Fielding, R., et al.: Hypertext transfer protocol-HTTP\/1.1. Technical report (1999)","DOI":"10.17487\/rfc2616"},{"key":"2_CR11","unstructured":"Gim\u00e9nez, C.T., Villegas, A.P., Mara\u00f1\u00f3n, G.\u00c1.: HTTP data set CSIC 2010. Inf. Secur. Inst. CSIC (Span. Res. Nat. Coun.) (2010)"},{"key":"2_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers","author":"DM Hawkins","year":"1980","unstructured":"Hawkins, D.M.: Identification of Outliers. Springer, Dordrecht (1980). \nhttps:\/\/doi.org\/10.1007\/978-94-015-3994-4"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Vigna, G.: Anomaly detection of web-based attacks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 251\u2013261. ACM (2003)","DOI":"10.1145\/948109.948144"},{"issue":"5","key":"2_CR14","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1016\/j.comnet.2005.01.009","volume":"48","author":"C Kruegel","year":"2005","unstructured":"Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Comput. Netw. 48(5), 717\u2013738 (2005)","journal-title":"Comput. Netw."},{"key":"2_CR15","unstructured":"Le Jr, D.: An unsupervised learning approach for network and system analysis (2017)"},{"issue":"7553","key":"2_CR16","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436 (2015)","journal-title":"Nature"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Lei, T., Cai, R., Yang, J.M., Ke, Y., Fan, X., Zhang, L.: A pattern tree-based approach to learning URL normalization rules. In: Proceedings of the 19th International Conference on World Wide Web, pp. 611\u2013620. ACM (2010)","DOI":"10.1145\/1772690.1772753"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Nguyen, H.T., Torrano-Gimenez, C., Alvarez, G., Petrovi\u0107, S., Franke, K.: Application of the generic feature selection measure in detection of web attacks. In: Herrero, \u00c1., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 25\u201332. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-21323-6_4","DOI":"10.1007\/978-3-642-21323-6_4"},{"key":"2_CR19","doi-asserted-by":"publisher","unstructured":"Qin, Z.Q., Ma, X.K., Wang, Y.J.: Attentional payload anomaly detector for web applications. In: Cheng, L., Leung, A.C.S., Ozawa, S. (eds.) ICONIP 2018. LNCS, vol. 11304, pp. 588\u2013599. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-030-04212-7_52","DOI":"10.1007\/978-3-030-04212-7_52"},{"key":"2_CR20","unstructured":"Shi, J., Cao, Y., Zhao, X.J.: Research on SEO strategies of university journal websites. In: The 2nd International Conference on Information Science and Engineering, pp. 3060\u20133063. IEEE (2010)"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Tang, P., Qiu, W., Huang, Z., Lian, H., Liu, G.: SQL injection behavior mining based deep learning. In: Gan, G., Li, B., Li, X., Wang, S. (eds.) ADMA 2018. LNCS (LNAI), vol. 11323, pp. 445\u2013454. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-030-05090-0_38","DOI":"10.1007\/978-3-030-05090-0_38"},{"issue":"16","key":"2_CR22","doi-asserted-by":"publisher","first-page":"2750","DOI":"10.1002\/sec.603","volume":"8","author":"C Torrano-Gimenez","year":"2015","unstructured":"Torrano-Gimenez, C., Nguyen, H.T., Alvarez, G., Franke, K.: Combining expert knowledge with automatic feature extraction for reliable web attack detection. Secur. Commun. Netw. 8(16), 2750\u20132767 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"2_CR23","doi-asserted-by":"publisher","unstructured":"Wang, K., Cretu, G., Stolfo, S.J.: Anomalous payload-based worm detection and signature generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 227\u2013246. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11663812_12","DOI":"10.1007\/11663812_12"},{"key":"2_CR24","doi-asserted-by":"publisher","unstructured":"Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203\u2013222. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-30143-1_11","DOI":"10.1007\/978-3-540-30143-1_11"},{"key":"2_CR25","unstructured":"Yang, Y., Zhang, L., Liu, G., Chen, E.: UPCA: an efficient URL-pattern based algorithm for accurate web page classification. In: 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 1475\u20131480. IEEE (2015)"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Yu, Y., Yan, H., Guan, H., Zhou, H.: DeepHTTP: semantics-structure model with attention for anomalous HTTP traffic detection and pattern mining. arXiv preprint \narXiv:1810.12751\n\n (2018)","DOI":"10.1109\/ICSSSM.2018.8465034"},{"key":"2_CR27","unstructured":"Yurcik, W., Barlow, J., Rosendale, J.: Maintaining perspective on who is the enemy in the security systems administration of computer networks. In: In ACM CHI Workshop on System Administrators Are Users, p. 345. ACM Press, November 2003"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zulkernine, M.: Anomaly based network intrusion detection with unsupervised outlier detection. In: 2006 IEEE International Conference on Communications, vol. 5, pp. 2388\u20132393. IEEE (2006)","DOI":"10.1109\/ICC.2006.255127"},{"key":"2_CR29","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.cose.2018.12.016","volume":"82","author":"Y Zhou","year":"2019","unstructured":"Zhou, Y., Wang, P.: An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence. Comput. Secur. 82, 261\u2013269 (2019)","journal-title":"Comput. Secur."}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Social Networks and Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9031-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T07:05:07Z","timestamp":1601017507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9031-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811590306","9789811590313"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9031-3_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocialSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security and Privacy in Social Networks and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socialsec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/socialsec2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"111","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}