[1]
S. Y. Hao, J. Long, and Y. C. Yang, BL-IDS: Detecting web attacks using Bi-LSTM model based on deep learning, in Security and Privacy in New Computing Environments, J. Li, Z. L. Liu, and H. Peng, eds. Springer, 2019, pp. 551-563.
[2]
Y. Zhou and P. C. Wang, An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence, Comp. Secur., vol. 82, pp. 261-269, 2019.
[3]
S. Rupam, A. Verma, and A. Singh, An approach to detect packets using packet sniffing, Int. J. Comp. Sci. Eng. Surv., vol. 4, no. 3, pp. 21-25, 2013.
[4]
L. Igual and S. Seguín, Introduction to Data Science: A Python Approach to Concepts, Techniques and Applications. Springer, 2017.
[5]
O. K. Sahingoza, E. Buberb, O. Demirb, and B. Diri, Machine learning based phishing detection from URLs, Expert Syst. Appl., vol. 117, pp. 345-357, 2019.
[6]
S. Raschka and V. Mirjalili, Python Machine Learning. 2nd ed. Birmingham, UK: Packt Publishing, 2017.
[7]
S. B. Kotsiantis, I. D. Zaharakis, and P. E. Pintelas, Machine learning: A review of classification and combining techniques, Artif. Intell. Rew., vol. 26, no. 3, pp. 159-190, 2006.
[8]
A. Guezzaz, A. Asimi, Y. Sadqi, Y. Asimi, and Z. Tbatou, A new hybrid network sniffer model based on pcap language and sockets (Pcapsocks), Int. J. Adv. Comp. Sci. Appl., vol. 7, no. 2, pp. 207-214, 2016.
[9]
A. Guezzaz, A. Asimi, Y. Asimi, Z. Tbatous, and Y. Sadqi, A global intrusion detection system using PcapSockS sniffer and multilayer perceptron classifier, Int. J. Netw. Secur., vol. 21, no. 3, pp. 438-450, 2019.
[10]
V. N. Vapnik, An overview of statistical learning theory, IEEE Trans. Neural Netw., vol. 10, no. 5, pp. 988-999, 1999.
[12]
M. Rochaa, P. Cortezb, and J. Nevesa, Evolution of neural networks for classification and regression, Neurocomputing, vol. 70, nos. 16-18, pp. 2809-2816, 2007.
[13]
M. Idhammad, K. Afdel, and M. Belouch, Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest, Hindawi Secur. Commun. Netw., vol. 2018, p. 1263123, 2018.
[14]
A. Guezzaz, A. Asimi, M. Azrour, Z. Batou, and Y. Asimi, A multilayer perceptron classifier for monitoring network traffic, in Big Data and Networks Technologies, Y. Farhaoui, ed. Springer, 2020.
[15]
Y. Farhaoui and A. Asimi, Performance method of assessment of the intrusion detection and prevention systems, Int. J. Eng. Sci. Technol., vol. 3, no. 7, pp. 5916-5928, 2011.
[16]
B. B. Yong, X. Liu, Q. C. Yu, L. Huang, and Q. G. Zhou, Malicious web traffic detection for internet of things environments, Comp. Electr. Eng., vol. 77, pp. 260-272, 2019.
[17]
M. ul-Hassan, M. A. Khan, K. Mahmood, and A. M. Shah. Analysis of IPv4 vs IPv6 traffic in US, Int. J. Adv. Comp. Sci. Appl., vol. 7, no. 12, pp. 261-267, 2016.