ACKNOWLEDGMENT
This research has been partially supported by the
Madrid region (EdgeData, Grant Ref. P2018/TCS-
4499). Miguel Calvo is supported by grants from the
Rey Juan Carlos University (ref. C-PREDOC21-007).
REFERENCES
Ande, R., Adebisi, B., Hammoudeh, M., and Saleem, J.
(2020). Internet of things: Evolution and technolo-
gies from a security perspective. Sustainable Cities
and Society, 54:101728.
Applebaum, S., Gaber, T., and Ahmed, A. (2021).
Signature-based and machine-learning-based web ap-
plication firewalls: A short survey. Procedia Com-
puter Science, 189:359–367. AI in Computational
Linguistics.
Babiker, M., Karaarslan, E., and Hoscan, Y. (2018). Web
application attack detection and forensics: A sur-
vey. In 2018 6th International Symposium on Digital
Forensic and Security (ISDFS), pages 1–6.
Betarte, G., Gimenez, E., Martinez, R., and Pardo, A.
(2018). Improving web application firewalls through
anomaly detection. In 2018 17th IEEE International
Conference on Machine Learning and Applications
(ICMLA), pages 779–784.
Boudko, S. and Abie, H. (2019). Adaptive cybersecurity
framework for healthcare internet of things. In 2019
13th International Symposium on Medical Informa-
tion and Communication Technology (ISMICT), pages
1–6.
Calvo, M. and Beltr
´
an, M. (2022). A model for risk-based
adaptive security controls. Computers & Security,
115:102612.
Chen, A., Xing, H., She, K., and Duan, G. (2016). A dy-
namic risk-based access control model for cloud com-
puting. In 2016 IEEE International Conferences on
Big Data and Cloud Computing (BDCloud), Social
Computing and Networking (SocialCom), Sustain-
able Computing and Communications (SustainCom)
(BDCloud-SocialCom-SustainCom), pages 579–584.
Djoudi, B., Bouanaka, C., and Zeghib, N. (2014). Model
checking pervasive context-aware systems. In 2014
IEEE 23rd International WETICE Conference, pages
92–97.
Domingues Junior, M. and Ebecken, N. F. (2021). A new
waf architecture with machine learning for resource-
efficient use. Computers & Security, 106:102290.
Elkhodary, A. and Whittle, J. (2007). A survey of ap-
proaches to adaptive application security. In Interna-
tional Workshop on Software Engineering for Adap-
tive and Self-Managing Systems (SEAMS ’07), pages
16–16.
Gambella, C., Ghaddar, B., and Naoum-Sawaya, J. (2021).
Optimization problems for machine learning: A sur-
vey. European Journal of Operational Research,
290(3):807–828.
Garn, B., Sebastian Lang, D., Leithner, M., Richard Kuhn,
D., Kacker, R., and Simos, D. E. (2021). Combinato-
rially xssing web application firewalls. In 2021 IEEE
International Conference on Software Testing, Verifi-
cation and Validation Workshops (ICSTW), pages 85–
94.
Gogoi, B., Ahmed, T., and Saikia, H. K. (2021). Detection
of xss attacks in web applications: A machine learn-
ing approach. International Journal of Innovative Re-
search in Computer Science & Technology (IJIRCST),
9(issue-1):2347–5552.
IS¸iker, B. and So
˘
Gukpinar, I. (2021). Machine learning
based web application firewall. In 2021 2nd Interna-
tional Informatics and Software Engineering Confer-
ence (IISEC), pages 1–6.
Ito, M. and Iyatomi, H. (2018). Web application firewall
using character-level convolutional neural network. In
2018 IEEE 14th International Colloquium on Signal
Processing Its Applications (CSPA), pages 103–106.
Kumeno, F. (2019). Sofware engneering challenges for ma-
chine learning applications: A literature review. Intel-
ligent Decision Technologies, 13:463–476. 4.
Lara, E., Aguilar, L., Sanchez, M. A., and Garc
´
ıa, J. A.
(2019). Adaptive Security Based on MAPE-K: A Sur-
vey, pages 157–183. Springer International Publish-
ing, Cham.
Martinelli, F., Michailidou, C., Mori, P., and Saracino, A.
(2018). Too long, did not enforce: A qualitative hier-
archical risk-aware data usage control model for com-
plex policies in distributed environments. In Proceed-
ings of the 4th ACM Workshop on Cyber-Physical Sys-
tem Security, CPSS ’18, page 27–37, New York, NY,
USA. Association for Computing Machinery.
Moradi Vartouni, A., Shokri, M., and Teshnehlab, M.
(2015). Auto-threshold deep svdd for anomaly-based
web application firewall.
Nafea, R. A. and Amin Almaiah, M. (2021). Cyber security
threats in cloud: Literature review. In 2021 Interna-
tional Conference on Information Technology (ICIT),
pages 779–786.
Schelter, S., Biessmann, F., Januschowski, T., Salinas, D.,
Seufert, S., and Szarvas, G. (2018). On challenges
in machine learning model management. IEEE Data
Eng. Bull., 41:5–15.
Shahid, W. B., Aslam, B., Abbas, H., Khalid, S. B., and
Afzal, H. (2022). An enhanced deep learning based
framework for web attacks detection, mitigation and
attacker profiling. Journal of Network and Computer
Applications, 198:103270.
SpiderLabs (2022). Modsecurity waf.
Steinegger, R. H., Deckers, D., Giessler, P., and Abeck, S.
(2016). Risk-based authenticator for web applications.
In Proceedings of the 21st European Conference on
Pattern Languages of Programs, EuroPlop ’16, New
York, NY, USA. Association for Computing Machin-
ery.
Sun, S., Cao, Z., Zhu, H., and Zhao, J. (2020). A sur-
vey of optimization methods from a machine learn-
ing perspective. IEEE Transactions on Cybernetics,
50(8):3668–3681.
SECRYPT 2022 - 19th International Conference on Security and Cryptography
106