{"created":"2020-09-01T15:14:31.746041+00:00","id":4658,"links":{},"metadata":{"_buckets":{"deposit":"7d53a0a4-46a1-41fc-ad83-7451181fc5bd"},"_deposit":{"id":"4658","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4658"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4658","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Classification of SQL injection, XSS and Path Traversal for Web Application Attack Detection","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Web application attack detection is one of thepopular research areas during these years. SQLinjection, XSS and path traversal attacks are themost commonly occurred types of webapplication attacks. The proposed systemeffectively classifies three attacks by randomforest algorithm to ensure reasonable accuracy.Request length module is computed based on thecertain length of the URL to analyze each recordas normal or attack. Regular pattern analysis isemphasized on the content of URL and otherfeatures to analyze the certain attack patterns.ECML/PKDD standard web attack dataset isused in this system. Combination of randomforest algorithm with request length and regexpattern analysis is proposed to outperform theaccuracy."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"201640.pdf","filesize":[{"value":"1155 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4658/files/201640.pdf"},"version_id":"da5bd49e-fc4e-4102-8990-f56c0bf7fd23"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourteenth International Conference On Computer Applications (ICCA 2016)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Han, Ei Ei"},{"subitem_authors_fullname":"Phyu, Thae Nu"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2016-02-25"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/309"},"item_title":"Classification of SQL injection, XSS and Path Traversal for Web Application Attack Detection","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"4658","relation_version_is_last":true,"title":["Classification of SQL injection, XSS and Path Traversal for Web Application Attack Detection"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T02:23:57.328823+00:00"}