Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean

The security of a network requires the correct identification and characterization of the attacks through its ports. This involves the follow-up of all the requests for access to the networks by all kinds of users. We consider the frequency of connections

Autores:
Gzyl, Henryk
ter Horst, Enrique
Peña García, Nathalie
Torres, Andres
Tipo de recurso:
Article of investigation
Fecha de publicación:
2023
Institución:
Colegio de Estudios Superiores de Administración
Repositorio:
Repositorio CESA
Idioma:
eng
OAI Identifier:
oai:repository.cesa.edu.co:10726/5517
Acceso en línea:
http://hdl.handle.net/10726/5517
https://doi.org/10.3390/e25111476
Palabra clave:
Cyber security
Web application firewalls
Feature space
Decision boundary
Maximum entropy in the mean
Rights
License
Abierto (Texto Completo)
id CESA2_994084c4e1130fc481262e2e4a6d8710
oai_identifier_str oai:repository.cesa.edu.co:10726/5517
network_acronym_str CESA2
network_name_str Repositorio CESA
repository_id_str
spelling Gzyl, Henryk169316a4-12f8-4afb-8213-5a74cbb8f41a-1ter Horst, Enriquebb497a43-c019-48d2-8bff-b5b9172cf707-1Peña García, Nathaliea7e16819-88df-486b-9297-0e56d5bfae3b-1Torres, Andresc19ca7ff-24a4-4837-aa0d-22b2cb1e9a21-1Gzyl, Henryk [0000-0002-3781-8848]ter Horst, Enrique [0000-0001-5153-1475]Peña García, Nathalie [0000-0002-6594-5940]Gzyl, Henryk [6701665186]ter Horst, Enrique [25655619900]Peña García, Nathalie [57202849705]Torres, Andres [58729136400]2024-08-05T14:23:29Z2024-08-05T14:23:29Z2023-10-241099-4300http://hdl.handle.net/10726/5517instname:Colegio de Estudios Superiores de Administración – CESAreponame:Biblioteca Digital – CESArepourl:https://repository.cesa.edu.co/https://doi.org/10.3390/e25111476engMDPIUnderstanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the meanarticlehttp://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/resource_type/c_6501info:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARThttp://purl.org/coar/version/c_71e4c1898caa6e32Abierto (Texto Completo)http://purl.org/coar/access_right/c_abf2The security of a network requires the correct identification and characterization of the attacks through its ports. This involves the follow-up of all the requests for access to the networks by all kinds of users. We consider the frequency of connectionshttps://orcid.org/0000-0002-3781-8848https://orcid.org/0000-0001-5153-1475https://orcid.org/0000-0002-6594-5940https://www.scopus.com/authid/detail.uri?authorId=6701665186https://www.scopus.com/authid/detail.uri?authorId=25655619900https://www.scopus.com/authid/detail.uri?authorId=57202849705https://www.scopus.com/authid/detail.uri?authorId=587291364002511EntropyCyber securityWeb application firewallsFeature spaceDecision boundaryMaximum entropy in the mean10726/5517oai:repository.cesa.edu.co:10726/55172024-08-05 09:23:33.824metadata only accessBiblioteca Digital - CESAbiblioteca@cesa.edu.co
dc.title.eng.fl_str_mv Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean
title Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean
spellingShingle Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean
Cyber security
Web application firewalls
Feature space
Decision boundary
Maximum entropy in the mean
title_short Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean
title_full Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean
title_fullStr Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean
title_full_unstemmed Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean
title_sort Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean
dc.creator.fl_str_mv Gzyl, Henryk
ter Horst, Enrique
Peña García, Nathalie
Torres, Andres
dc.contributor.author.none.fl_str_mv Gzyl, Henryk
ter Horst, Enrique
Peña García, Nathalie
Torres, Andres
dc.contributor.orcid.none.fl_str_mv Gzyl, Henryk [0000-0002-3781-8848]
ter Horst, Enrique [0000-0001-5153-1475]
Peña García, Nathalie [0000-0002-6594-5940]
dc.contributor.scopus.none.fl_str_mv Gzyl, Henryk [6701665186]
ter Horst, Enrique [25655619900]
Peña García, Nathalie [57202849705]
Torres, Andres [58729136400]
dc.subject.proposal.none.fl_str_mv Cyber security
Web application firewalls
Feature space
Decision boundary
Maximum entropy in the mean
topic Cyber security
Web application firewalls
Feature space
Decision boundary
Maximum entropy in the mean
description The security of a network requires the correct identification and characterization of the attacks through its ports. This involves the follow-up of all the requests for access to the networks by all kinds of users. We consider the frequency of connections
publishDate 2023
dc.date.issued.none.fl_str_mv 2023-10-24
dc.date.accessioned.none.fl_str_mv 2024-08-05T14:23:29Z
dc.date.available.none.fl_str_mv 2024-08-05T14:23:29Z
dc.type.none.fl_str_mv article
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.coar.none.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.driver.none.fl_str_mv info:eu-repo/semantics/article
dc.type.redcol.none.fl_str_mv http://purl.org/redcol/resource_type/ART
dc.type.coarversion.none.fl_str_mv http://purl.org/coar/version/c_71e4c1898caa6e32
format http://purl.org/coar/resource_type/c_2df8fbb1
dc.identifier.issn.none.fl_str_mv 1099-4300
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/10726/5517
dc.identifier.instname.none.fl_str_mv instname:Colegio de Estudios Superiores de Administración – CESA
dc.identifier.reponame.none.fl_str_mv reponame:Biblioteca Digital – CESA
dc.identifier.repourl.none.fl_str_mv repourl:https://repository.cesa.edu.co/
dc.identifier.doi.none.fl_str_mv https://doi.org/10.3390/e25111476
identifier_str_mv 1099-4300
instname:Colegio de Estudios Superiores de Administración – CESA
reponame:Biblioteca Digital – CESA
repourl:https://repository.cesa.edu.co/
url http://hdl.handle.net/10726/5517
https://doi.org/10.3390/e25111476
dc.language.iso.none.fl_str_mv eng
language eng
dc.relation.citationvolume.none.fl_str_mv 25
dc.relation.citationissue.none.fl_str_mv 11
dc.relation.ispartofjournal.none.fl_str_mv Entropy
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.local.none.fl_str_mv Abierto (Texto Completo)
rights_invalid_str_mv Abierto (Texto Completo)
http://purl.org/coar/access_right/c_abf2
dc.publisher.none.fl_str_mv MDPI
publisher.none.fl_str_mv MDPI
institution Colegio de Estudios Superiores de Administración
repository.name.fl_str_mv Biblioteca Digital - CESA
repository.mail.fl_str_mv biblioteca@cesa.edu.co
_version_ 1831930148848402432