- C. Wilson, “Botnets, cyber crime, and cyber terrorism: Vulnerabilities and policy issues for congress,” Washington, DC, 2008.
- D. Doran and S. S. Gokhale, “Web robot detection techniques: overview and limitations,” Data Min. Knowl. Disc., vol. 22, no. 1-2, pp. 183-210, 2011.
- T. Kabe and M. Miyazaki, “Determining WWW user-agents from server access log,” in Proceedings of seventh international conference on parallel and distributed systems, 2000.
- P. Huntington, D. Nicholas, and H. R. Jamali, “Web robot detection in the scholarly information environment,” Journal of Information Science, vol. 34, no. 5, pp. 726-741, 2008.
- N. Geens, J. Huysmans, and J. Vanthienen, “Evaluation of Web robot discovery techniques: a benchmarking study,” Lecture notes in computer science, vol. 4065, no. 1, pp. 121-130, 2006.
- W. Guo, S. Ju, and Y. Gu, “Web robot detection techniques based on statistics of their requested URL resources,” in Proceedings of ninth international conference on computer supported cooperative work in design, 2005.
- O. M. Duskin and D. G. Feitelson, “Distinguishing humans from robots in web search logs: preliminary results using query rates and intervals,” in Proceedings of 2009 workshop on Web Search Click Data, 2009.
- X. Lin, L. Quan, and H. Wu, “An Automatic Scheme to Categorize User Sessions in Modern HTTP Traffic,” in Proceedings of IEEE global telecommunications conference, 2008.
- P. N. Tan and V. Kumar, “Discovery of Web Robot Sessions Based on their Navigational Patterns,” Data Mining and Knowledge Discovery, vol. 6, no. 1, pp. 9-35, 2002.
- C. Bomhardt, W. Gaul, and L. Schmidt-Thieme, “Web Robot Detection - Preprocessing Web Log Files for Robot Detection,” New Developments in Classification and Data Analysis, vol. 1, no. 1, pp. 113-124, 2006.
- A. Stassopoulou and M. D. Dikaiakos, “Web robot detection - A probabilistic reasoning approach,” Computer Networks, vol. 53, no. 3, pp. 265-278, 2009.
- W.-Z. Lu and S.-Z. Yu, “Web Robot Detection Based on Hidden Markov Model,” in Proceedings of international conference on communications, circuits and systems, 2006.
- D. Stevanovic, A. An, and N. Vlajic, “Feature evaluation for web crawler detection with data mining techniques,” Expert Systems with Applications, vol. 39, no. 10, pp. 8707-8717, 2012.
- D. Stevanovic, N. Vlajic, and A. An, “Detection of malicious and non-malicious website visitors using unsupervised neural network learning,” Applied Soft Computing, vol. 13, no. 1, pp. 698–708, 2013.
- L. V. Ahn and et al., “CAPTCHA: Using Hard AIP Problems for Security,” in Proceedings of Eurocrypt, 2003.
- K. Park and et al., “Securing Web Service by Automatic Robot Detection,” in Proceedings of the annual conference on USENIX ’06 annual technical conference, 2006.
- D. Stevanovic and N. Vlajic, “An Integrated Approach to Defence Against Degrading Application-Layer DDoS Attacks,” Toronto, Canada, 2013.
- H. Liu and V. Keselj, “Combined mining of Web server logs and web contents or classifying user navigation patterns and predicting users’ future requests,” Data & Knowledge Engineering, vol. 61, no. 2, pp. 304–330, 2007.
- 2015. [Online]. Available: http://www.botsvsbrowsers.com/.
- 2015. [Online]. Available: http://www.user-agents.org/.
- 2015. [Online]. Available: http://www.useragentstring.com/.
- K. Selvakuberan, M. Indradevi, and R. Rajaram, “Combined Feature Selection and classification – A novel approach for the categorization of web pages,” Journal of Information and Computing Science, vol. 3, no. 2, pp. 83-89, 2008.
- L. Yu and H. Liu, “Feature Selection for High-Dimensional Data: A Fast Correlation-Based Filter Solution,” in Proceedings of the Twentieth International Conference on Machine Learning (ICML), Washington DC, 2003.
- M. Aggarwal and Amrita, “Performance Analysis of Different Feature Selection Methods In Intrusion Detection,” International Journal of Scientific & Technology Research, vol. 2, no. 6, pp. 255-231, June 2013.
- I. H. Witten, E. Frank, and M. A. Hall, “Data Mining: Practical Machine Learning Tools and Techniques,” Burlington: Morgan Kaufmann - Elsevier, 2011.
- P. N. Tan, M. Steinbach, and V. Kumar, “Introduction to Data Mining,” Pearson Education, Inc., 2006.
- “Denial of Service Attacks,” [Online]. Available: http://www.cert.org/tech_tips/denial_of_service.html.
- C. M. Patel, “Survey On Taxonomy of DDoS Attacks With Impact And Mitigation Techniques,” International Journal of Engineering Research & Technology (IJERT), vol. 2, no. 9, pp. 1-8, 2012.
- C. Douligeris and A. Mitrokotsa, “DDoS attacks and defense mechanisms: classification and state-of-the-art,” Computer Networks, vol. 44, pp. 643-666, 2004.
- “Trends in Denial of Service Technology,” [Online]. Available: http://www.cert.org/archive/pdf/DoS_trends.pdf.
- H.-V. Nguyen and Y. Choi, “Proactive Detection of DDoS Attacks Utilizing k-NN Classifier in an Anti-DDoS Framework,” International Journal of Electrical and Electronics Engineering, vol. 4, no. 4, pp. 247-252, 2010.
- K. Lee and et al., “DDoS Attack Detection Method Using Cluster Analysis,” Expert Systems with Applications, vol. 34, no. 3, pp. 1659-1665, 2008.
- J. Mirkovic and P. Reiher, “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39-53, 2004.
- P. Zaroo, “A Survey of DDoS attacks and some DDoS defense mechanisms,” Advanced Information Assurance (CS 626), 2002.
- C. Wilson, “Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress,” Washington, DC, 2008.
- J. Mirkovic, J. Martin, and P. Reiher, “A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms,” Los Angeles, 2002.
- T. Peng, L. Christopher, and K. Ramamohanarao, “Survey of network-based defense mechanisms countering the DoS and DDoS problems,” ACM Computing Survey, vol. 39, no. 1, pp. 1-42, 2007.
- K. Arora, K. Kumar, and M. Sachdeva, “Impact Analysis of Recent DDoS Attacks,” International Journal on Computer Science and Engineering (IJCSE), vol. 3, no. 2, pp. 877-884, 2011.
- M. H. Bhuyan and et al., “Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions,” The Computer Journal, 2012.
- S. Noel, D. Wijesekera, and C. Youman, “Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt,” in Applications of Data Mining in Computer Security, George Mason, Kluwer Academic Publishers, pp. 1-31, 2003.
- P. M. HallamBaker and B. Behlendorf, 2015. [Online]. Available: http://www.w3.org/TR/WDlogfile.html.
- J. Lee and et al., “Classification of web robots: An empirical study based on over one billion requests,” computers & security, vol. 28, pp. 795–802, 2009.
- Z. Chen and W. Feng, “Detecting Impolite Crawler by using Time Series Analysis,” in IEEE 25th International Conference on Tools with Artificial Intelligence (ICTAI), pp. 123-126, 2013.
- X. Sun and et al., “Feature selection using dynamic weights for classification,” Knowledge-Based Systems, vol. 37, no.1, pp. 541–549, 2013.
|