Filters








5,261 Hits in 4.6 sec

Web-log cleaning for constructing sequential classifiers

Qiang Yang, Tianyiian Li, Ke Wang
2003 Applied Artificial Intelligence  
Furthermore, when constructing the classification model, we adopt a pessimistic selection method for choosing among alternative predictions.  ...  In this work, we construct sequential classifiers for predicting the users' next visits based on the current actions using association rule mining.  ...  For example, a default rule can simply be the most frequently requested page in the training web log.  ... 
doi:10.1080/713827182 fatcat:qdjeweqojndi7lnr75ulipuncq

Prediction of web services reliability based on decision tree classification method

Zhichun Jia, Qiuyang Han, Yanyan Li, Yuqiang Yang, Xing Xing
2020 Computers Materials & Continua  
This paper proposes a service decision tree based post-pruning prediction approach. This paper first defines the five reliability levels for measuring the reliability of services.  ...  Moreover, this paper applies the post-pruning strategy to optimize the generated model for avoiding the over-fitting.  ...  Finally, when the user sends a reliability prediction request, the prediction result of the reliability can be generated by the decision tree for web services and return to the user.  ... 
doi:10.32604/cmc.2020.09722 fatcat:eheeslz4hrgdfkgw652xuu7qta

Classification of Malicious Web Sessions

Katerina Goseva-Popstojanova, Goce Anastasovski, Risto Pantev
2012 2012 21st International Conference on Computer Communications and Networks (ICCCN)  
Furthermore, we follow the principle of Occam's razor, that is, we seek for the simplest possible model that can successfully classify malicious Web sessions.  ...  The ever increasing number of vulnerabilities and reported attacks on Web systems clearly illustrate the need for better understanding of malicious cyber activities, which will allow better protection,  ...  For example, unpruned J48 tree for Web 2.0 II has 59 leaves and 117 nodes, while pruned J48 tree has 33 leaves and 65 nodes.  ... 
doi:10.1109/icccn.2012.6289291 dblp:conf/icccn/Goseva-PopstojanovaAP12 fatcat:3n4f37bi5vccnn5zcrlcyvhara

CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud

Saeed Shafieian, Mohammad Zulkernine, Anwar Haque
2015 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing  
The attack exhausts the target's resources such as Web server connection pool and generally needs much less bandwidth compared to traditional volumetric attacks.  ...  The Cloud is an ideal platform to launch slow-read attack, since virtual machines on the Cloud can be easily exploited as a botnet for the purpose of this attack.  ...  The authors would also like to thank Jenny Chien for helping in pre-processing the datasets for the experiments.  ... 
doi:10.1109/cit/iucc/dasc/picom.2015.261 dblp:conf/IEEEcit/ShafieianZH15 fatcat:65n4pxdf7nbn3chquanuhtichm

Using Multiclass Machine Learning Methods to Classify Malicious Behaviors Aimed at Web Systems

Katerina Goseva-Popstojanova, Goce Anastasovski, Risto Pantev
2012 2012 IEEE 23rd International Symposium on Software Reliability Engineering  
This paper is focused on multiclass classification of malicious Web activities using three supervised machine learning methods: J48, PART, and Support Vector Machines (SVM).  ...  The empirical analysis is based on data collected in duration of nine months by a highinteraction honeypot consisting of a three-tier Web system, which included Web 2.0 applications (i.e., a blog and wiki  ...  Before continuing the comparison of the learners, we discuss the top ranked features which have the highest predictive power for the classification of malicious Web traffic.  ... 
doi:10.1109/issre.2012.30 dblp:conf/issre/Goseva-PopstojanovaAP12 fatcat:p6ssvekdwrhzzcjfqpktdbpzhi

Semantic Web Usage Mining to develop Prediction System

Nu WarHsan
2014 International Journal of Computer Applications  
In this paper, the prediction system is developed which extracts the key web objects from web log file and apply a semantic web to mine actionable intelligence.  ...  Web usage mining has been applied effectively in prediction system to overcome deficiencies of traditional approaches.  ...  It also described as the future work to predict user's future requests by using different techniques such as classification, clustering and association rule mining.  ... 
doi:10.5120/18815-0414 fatcat:ld5wldsuujdf7cwjfvuuq6u3ti

Enhanced User Navigation Prediction using Ensembling Clustering and Classification in weblog files

Dr. Sujatha V., Dr. Punithavalli M., Dr.Ranjit Jeba Thangiah
2018 International Journal on Computer Science and Engineering  
The proposed system uses heterogeneous clustering ensemble model to group similar browsing sequences together, which is then used by a heterogeneous classification ensemble model to predict future requests  ...  Next web page prediction, a task of web usage mining, is used to envisage future requirements of the user during surfing.  ...  for predicting next web page.  ... 
doi:10.21817/ijcse/2018/v10i1/181001022 fatcat:67l6gqfxmzf7biitqtuk2wsthu

A Decision Tree Approach to Classify Web Services using Quality Parameters [article]

Shilpa Sonawani, Debajyoti Mukhopadhyay
2013 arXiv   pre-print
This problem can be solved by considering the quality of web services to distinguish functionally similar web services. Nine different quality parameters are considered.  ...  With the increase in the number of web services, many web services are available on internet providing the same functionality, making it difficult to choose the best one, fulfilling users all requirements  ...  ZeroR: It predicts the majority class in the training data for problems with a categorical class value, and the average class value for numeric prediction problems.  ... 
arXiv:1311.6240v1 fatcat:xsp4yvajuzeffmjoutyxskguxy

An On-Line Learning Statistical Model to Detect Malicious Web Requests [chapter]

Harald Lampesberger, Philipp Winter, Markus Zeilinger, Eckehard Hermann
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
In this paper, we present a generic method for detecting anomalous and potentially malicious web requests from the network's point of view without prior knowledge or training data of the web-based application  ...  Malicious requests are in different order or include entities which deviate from the structure of the majority of requests.  ...  For prediction, the symbols of the web request are mapped to similar symbols in A if possible. This mapping function Φ requires a metric to compare symbols.  ... 
doi:10.1007/978-3-642-31909-9_2 fatcat:w3xv5awk6jcoppsnv3coeca4ym

An integrated model for next page access prediction

F. Khalil, J. Li, H. Wang
2009 International Journal of Knowledge and Web Intelligence  
Recent research initiatives have addressed the need for improved performance of Web page prediction that would profit many applications, e-business in particular.  ...  Implementing pattern discovery techniques as such helps predict the next page to be accessed a Web user based on the user's previous browsing patterns.  ...  All three methods have been widely used for Web page access prediction.  ... 
doi:10.1504/ijkwi.2009.027925 fatcat:6bmqs5t7ebgjxnvydpyjwbat2q

Delivering Categorized News Items Using RSS Feeds and Web Services

Subrata Saha, Atul Sajjanhar, Shang Gao, Robert Dew, Ying Zhao
2010 2010 10th IEEE International Conference on Computer and Information Technology  
In this paper, we propose a method for managing RSS feeds from various news websites.  ...  A prototype was implemented using Rapidminer 4.3 as a data mining tool and SVM as a classification algorithm.  ...  RESULTS AND D A training model is created from applying the classification algorithm then used for prediction. For featu pre-processing techniques and TFI data into vectors.  ... 
doi:10.1109/cit.2010.136 dblp:conf/IEEEcit/SahaSGDZ10 fatcat:hjy5wruusncpnnfgqpg2tlgcay

Improving ELM-Based Service Quality Prediction by Concise Feature Extraction

Yuhai Zhao, Ying Yin, Gang Sheng, Bin Zhang, Guoren Wang
2015 Mathematical Problems in Engineering  
An efficient prefix tree based mining algorithm together with some effective pruning rules is developed to mine such rules.  ...  Web services often run on highly dynamic and changing environments, which generate huge volumes of data.  ...  We select two different scenarios: one is Web service quality prediction and the other is Web service fault diagnosis prediction. We provide two kinds of datasets. For the real dataset, we use E.  ... 
doi:10.1155/2015/325192 fatcat:sw647zdepzekxn2kt3tcyv53ku

Characterization and classification of malicious Web traffic

Katerina Goseva-Popstojanova, Goce Anastasovski, Ana Dimitrijevikj, Risto Pantev, Brandon Miller
2014 Computers & security  
This study is focused on characterization and classification of malicious cyber activities aimed at Web systems.  ...  Empirical study Malicious web sessions Vulnerability scans Attacks Statistical inference Classification a b s t r a c t Web systems commonly face unique set of vulnerabilities and security threats due  ...  Alex Baker for their support with the experimental setup and data extraction process. We also thank the anonymous reviewers for their comments and suggestions.  ... 
doi:10.1016/j.cose.2014.01.006 fatcat:azawx4vvpzc6bnlvkwe3b2uzs4

Intelligent web caching using machine learning methods

Sarina Sulaiman, Siti Mariyam Shamsuddin, Ajith Abraham, Shahida Sulaiman
2011 Neural Network World  
This research includes four methods that are Classification and Regression Trees (CART), Multivariate Adaptive Regression Splines (MARS), Random Forest (RF) and TreeNet (TN) for classification on Web caching  ...  This research aims to introduce an advanced machine learning method for a classification problem in Web caching that requires a decision to cache or not to cache Web objects in a proxy cache server.  ...  Each completed request for a Web file increases the number of hit for the requested file.  ... 
doi:10.14311/nnw.2011.21.025 fatcat:yagb2ocr6bdvvlp3vq7ljzgqeq

Dark Web Data Classification Using Neural Network

Anand Singh Rajawat, Pradeep Bedi, S. B. Goyal, Sandeep Kautish, Zhang Xihua, Hanan Aljuaid, Ali Wagdy Mohamed, Ahmed Mostafa Khalil
2022 Computational Intelligence and Neuroscience  
To require an approach for learning the criminal behavior to check the recent request for improving the labeled data as a user profiling, Dark Web Structural Patterns mining in the case of multidimensional  ...  Uncertain classification results cause a problem of not being able to predict user behavior. Since data of multidimensional nature has feature mixes, it has an adverse influence on classification.  ...  . is pruning approach permits the search space to be complete after a pattern is noticeable as infrequent; then no novel pattern requirements are produced. e enormous volumes of data in numerous request  ... 
doi:10.1155/2022/8393318 pmid:35387252 pmcid:PMC8979735 fatcat:agotv724mvapzp3btmy4alkpfu
« Previous Showing results 1 — 15 out of 5,261 results