Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean
The security of a network requires the correct identification and characterization of the attacks through its ports. This involves the follow-up of all the requests for access to the networks by all kinds of users. We consider the frequency of connections
- Autores:
-
Gzyl, Henryk
ter Horst, Enrique
Peña García, Nathalie
Torres, Andres
- Tipo de recurso:
- Article of investigation
- Fecha de publicación:
- 2023
- Institución:
- Colegio de Estudios Superiores de Administración
- Repositorio:
- Repositorio CESA
- Idioma:
- eng
- OAI Identifier:
- oai:repository.cesa.edu.co:10726/5517
- Acceso en línea:
- http://hdl.handle.net/10726/5517
https://doi.org/10.3390/e25111476
- Palabra clave:
- Cyber security
Web application firewalls
Feature space
Decision boundary
Maximum entropy in the mean
- Rights
- License
- Abierto (Texto Completo)
id |
CESA2_994084c4e1130fc481262e2e4a6d8710 |
---|---|
oai_identifier_str |
oai:repository.cesa.edu.co:10726/5517 |
network_acronym_str |
CESA2 |
network_name_str |
Repositorio CESA |
repository_id_str |
|
spelling |
Gzyl, Henryk169316a4-12f8-4afb-8213-5a74cbb8f41a-1ter Horst, Enriquebb497a43-c019-48d2-8bff-b5b9172cf707-1Peña García, Nathaliea7e16819-88df-486b-9297-0e56d5bfae3b-1Torres, Andresc19ca7ff-24a4-4837-aa0d-22b2cb1e9a21-1Gzyl, Henryk [0000-0002-3781-8848]ter Horst, Enrique [0000-0001-5153-1475]Peña García, Nathalie [0000-0002-6594-5940]Gzyl, Henryk [6701665186]ter Horst, Enrique [25655619900]Peña García, Nathalie [57202849705]Torres, Andres [58729136400]2024-08-05T14:23:29Z2024-08-05T14:23:29Z2023-10-241099-4300http://hdl.handle.net/10726/5517instname:Colegio de Estudios Superiores de Administración – CESAreponame:Biblioteca Digital – CESArepourl:https://repository.cesa.edu.co/https://doi.org/10.3390/e25111476engMDPIUnderstanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the meanarticlehttp://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/resource_type/c_6501info:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARThttp://purl.org/coar/version/c_71e4c1898caa6e32Abierto (Texto Completo)http://purl.org/coar/access_right/c_abf2The security of a network requires the correct identification and characterization of the attacks through its ports. This involves the follow-up of all the requests for access to the networks by all kinds of users. We consider the frequency of connectionshttps://orcid.org/0000-0002-3781-8848https://orcid.org/0000-0001-5153-1475https://orcid.org/0000-0002-6594-5940https://www.scopus.com/authid/detail.uri?authorId=6701665186https://www.scopus.com/authid/detail.uri?authorId=25655619900https://www.scopus.com/authid/detail.uri?authorId=57202849705https://www.scopus.com/authid/detail.uri?authorId=587291364002511EntropyCyber securityWeb application firewallsFeature spaceDecision boundaryMaximum entropy in the mean10726/5517oai:repository.cesa.edu.co:10726/55172024-08-05 09:23:33.824metadata only accessBiblioteca Digital - CESAbiblioteca@cesa.edu.co |
dc.title.eng.fl_str_mv |
Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean |
title |
Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean |
spellingShingle |
Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean Cyber security Web application firewalls Feature space Decision boundary Maximum entropy in the mean |
title_short |
Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean |
title_full |
Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean |
title_fullStr |
Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean |
title_full_unstemmed |
Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean |
title_sort |
Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean |
dc.creator.fl_str_mv |
Gzyl, Henryk ter Horst, Enrique Peña García, Nathalie Torres, Andres |
dc.contributor.author.none.fl_str_mv |
Gzyl, Henryk ter Horst, Enrique Peña García, Nathalie Torres, Andres |
dc.contributor.orcid.none.fl_str_mv |
Gzyl, Henryk [0000-0002-3781-8848] ter Horst, Enrique [0000-0001-5153-1475] Peña García, Nathalie [0000-0002-6594-5940] |
dc.contributor.scopus.none.fl_str_mv |
Gzyl, Henryk [6701665186] ter Horst, Enrique [25655619900] Peña García, Nathalie [57202849705] Torres, Andres [58729136400] |
dc.subject.proposal.none.fl_str_mv |
Cyber security Web application firewalls Feature space Decision boundary Maximum entropy in the mean |
topic |
Cyber security Web application firewalls Feature space Decision boundary Maximum entropy in the mean |
description |
The security of a network requires the correct identification and characterization of the attacks through its ports. This involves the follow-up of all the requests for access to the networks by all kinds of users. We consider the frequency of connections |
publishDate |
2023 |
dc.date.issued.none.fl_str_mv |
2023-10-24 |
dc.date.accessioned.none.fl_str_mv |
2024-08-05T14:23:29Z |
dc.date.available.none.fl_str_mv |
2024-08-05T14:23:29Z |
dc.type.none.fl_str_mv |
article |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.coar.none.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.driver.none.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.redcol.none.fl_str_mv |
http://purl.org/redcol/resource_type/ART |
dc.type.coarversion.none.fl_str_mv |
http://purl.org/coar/version/c_71e4c1898caa6e32 |
format |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.identifier.issn.none.fl_str_mv |
1099-4300 |
dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/10726/5517 |
dc.identifier.instname.none.fl_str_mv |
instname:Colegio de Estudios Superiores de Administración – CESA |
dc.identifier.reponame.none.fl_str_mv |
reponame:Biblioteca Digital – CESA |
dc.identifier.repourl.none.fl_str_mv |
repourl:https://repository.cesa.edu.co/ |
dc.identifier.doi.none.fl_str_mv |
https://doi.org/10.3390/e25111476 |
identifier_str_mv |
1099-4300 instname:Colegio de Estudios Superiores de Administración – CESA reponame:Biblioteca Digital – CESA repourl:https://repository.cesa.edu.co/ |
url |
http://hdl.handle.net/10726/5517 https://doi.org/10.3390/e25111476 |
dc.language.iso.none.fl_str_mv |
eng |
language |
eng |
dc.relation.citationvolume.none.fl_str_mv |
25 |
dc.relation.citationissue.none.fl_str_mv |
11 |
dc.relation.ispartofjournal.none.fl_str_mv |
Entropy |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.local.none.fl_str_mv |
Abierto (Texto Completo) |
rights_invalid_str_mv |
Abierto (Texto Completo) http://purl.org/coar/access_right/c_abf2 |
dc.publisher.none.fl_str_mv |
MDPI |
publisher.none.fl_str_mv |
MDPI |
institution |
Colegio de Estudios Superiores de Administración |
repository.name.fl_str_mv |
Biblioteca Digital - CESA |
repository.mail.fl_str_mv |
biblioteca@cesa.edu.co |
_version_ |
1831930148848402432 |