is about one hundred percent. However, this method
can be applied only if the number of HTTP requests
to a web-resource is enough to analyze the normal be-
haviour of users. Sometimes, attackers try to access
the data stored on servers or to harm the system by us-
ing holes in the security of not popular web-resources
for which it is difficult to define which requests are
”normal”. In the future, we are planning to develop
anomaly detection based system which can solve this
problem.
REFERENCES
Apache 2.0 Documentation (2011).
http://www.apache.org/.
Axelsson, S. (1998). Automatically hardening web applica-
tions using precise tainting. Technical report, Depart-
ment of Computer Engineering, Chalmers University
of Technology, Goteborg, Sweden.
Chan, A. and Pampalk, E. (2002). Growing hierarchical self
organising map (ghsom) toolbox: visualisations and
enhancements. In 9-th International Conference Neu-
ral Information Processing, ICONIP ’02, volume 5,
pages 2537–2541.
Gollmann, D. (2006). Computer Security. Wiley, 2nd edi-
tion.
Hirsimaki, T., Pylkkonen, J., and Kurimo, M. (2009). Im-
portance of high-order n-gram models in morph-based
speech recognition. Audio, Speech, and Language
Processing, IEEE Transactions, 17:724–732.
Ippoliti, D. and Xiaobo, Z. (2010). An adaptive growing
hierarchical self organizing map for network intru-
sion detection. In 19th IEEE International Conference
Computer Communications and Networks (ICCCN),
pages 1–7.
Jiang, D., Yang, Y., and Xia, M. (2009). Research on intru-
sion detection based on an improved som neural net-
work. In Fifth International Conference on Informa-
tion Assurance and Security, pages 400–403.
Johnson, R. W. (1994). Estimating the size of a population.
Teaching Statistics, 16:50–52.
Kayacik, H. G., Nur, Z.-H., and Heywood, M. I. (2007).
A hierarchical som-based intrusion detection system.
Engineering Applications of Artificial Intelligence,
20:439–451.
Kemmerer, R. and Vigna, G. (2002). Intrusion detection: A
brief history and overview. Computer, 35:27–30.
Kohonen, T. (1982). Self-organized formation of topolog-
ically correct feature maps. Biological cybernetics,
43:59–69.
Kohonen, T. (2001). Self-organizing map. Springer-Verlag,
Berlin, 2rd edition.
Mukkamala, S. and Sung, A. (2003). A comparative study
of techniques for intrusion detection. In Tools with
Artificial Intelligence, 15th IEEE International Con-
ference.
Nguyen-Tuong, A., Guarnieri, S., Greene, D., Shirley, J.,
and Evans, D. (2005). Automatically hardening web
applications using precise tainting. In 20th IFIP Inter-
national Information Security Conference.
Palomo, E. J., Dom´ınguez, E., Luque, R. M., and Mu˜noz,
J. (2008). A New GHSOM Model Applied to Network
Security, volume 5163 of Lecture Notes in Computer
Science. Springer, Berlin, Germany.
Patcha, A. and Park, J. (2007). An overview of anomaly de-
tection techniques: Existing solutions and latest tech-
nological trends. Computer Networks: The Interna-
tional Journal of Computer and Telecommunications
Networking, 51.
Rauber, A., Merkl, D., and Dittenbach, M. (2002).
The growing hierarchical self-organizing map: ex-
ploratory analysis of high-dimensional data. Neural
Networks, IEEE Transactions, 13:1331–1341.
Shehab, M., Mansour, N., and Faour, A. (2008). Growing
hierarchical self-organizing map for filtering intrusion
detection alarms. In International Symposium Paral-
lel Architectures, Algorithms, and Networks, I-SPAN,
pages 167–172.
Suen, C. Y. (1979). n-gram statistics for natural language
understanding and text processing. Pattern Analysis
and Machine Intelligence, IEEE Transactions, PAMI-
1:162–172.
Ultsch, A. (2003a). Maps for the visualization of high-
dimensional data spaces. In Workshop on Self-
Organizing Maps (WSOM 2003),, pages 225–230.
Ultsch, A. (2003b). Pareto density estimation: A density
estimation for knowledge discovery. In Innovations
in Classification, Data Science, and Information Sys-
tems - Proc. 27th Annual Conference of the German
Classification Siciety, pages 91–100.
Ultsch, A. and Siemon, H. P. (1990). Kohonen’s self or-
ganizing feature maps for exploratory data analysis.
In Proc. Intern. Neural Networks, Kluwer Academic
Press, pages 305–308.
Ultschk, A. (2005). Clustering with som: U*c. In U*C.
Proc. Workshop on Self-Organizing Maps (WSOM
2005), pages 75–82.
Verwoerd, T. and Hunt, R. (2002). Intrusion detection tech-
niques and approaches. Computer Communications,
25:1356–1365.
WEBIST2012-8thInternationalConferenceonWebInformationSystemsandTechnologies
642