{"id":"https://openalex.org/W3198102431","doi":"https://doi.org/10.1109/blackseacom52164.2021.9527746","title":"Detecting indicators of compromise in web applications using access logs","display_name":"Detecting indicators of compromise in web applications using access logs","publication_year":2021,"publication_date":"2021-05-24","ids":{"openalex":"https://openalex.org/W3198102431","doi":"https://doi.org/10.1109/blackseacom52164.2021.9527746","mag":"3198102431"},"language":"en","primary_location":{"id":"doi:10.1109/blackseacom52164.2021.9527746","is_oa":false,"landing_page_url":"https://doi.org/10.1109/blackseacom52164.2021.9527746","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069050355","display_name":"Ionut Cernica","orcid":null},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Ionut Cernica","raw_affiliation_strings":["Faculty of Automatic Control and Computer Science, University Politehnica of Bucharest, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Faculty of Automatic Control and Computer Science, University Politehnica of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082298204","display_name":"Nirvana Popescu","orcid":"https://orcid.org/0000-0002-7843-7187"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Nirvana Popescu","raw_affiliation_strings":["Faculty of Automatic Control and Computer Science, University Politehnica of Bucharest, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Faculty of Automatic Control and Computer Science, University Politehnica of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059955602","display_name":"R\u0103zvan Cr\u0103ciunescu","orcid":"https://orcid.org/0000-0003-0060-3306"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Razvan Craciunescu","raw_affiliation_strings":["Future Networks 5G Lab, University Politehnica of Bucharest, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Future Networks 5G Lab, University Politehnica of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069050355"],"corresponding_institution_ids":["https://openalex.org/I61641377"],"apc_list":null,"apc_paid":null,"fwci":0.5508,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73032108,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7726998329162598},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6865533590316772},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.6239858865737915},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5474267601966858},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5148565173149109},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.4985227584838867},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4787706434726715},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.46318671107292175},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.42266032099723816},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.3482716679573059},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.3434722423553467}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7726998329162598},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6865533590316772},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.6239858865737915},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5474267601966858},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5148565173149109},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4985227584838867},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4787706434726715},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.46318671107292175},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.42266032099723816},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.3482716679573059},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.3434722423553467},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/blackseacom52164.2021.9527746","is_oa":false,"landing_page_url":"https://doi.org/10.1109/blackseacom52164.2021.9527746","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/3","score":0.75,"display_name":"Good health and well-being"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1484776461","https://openalex.org/W1658853941","https://openalex.org/W1811853421","https://openalex.org/W1974319290","https://openalex.org/W2515955240","https://openalex.org/W2553448453","https://openalex.org/W2616563351","https://openalex.org/W2621647126","https://openalex.org/W2756489700","https://openalex.org/W2763430219","https://openalex.org/W2765438277","https://openalex.org/W2774967109","https://openalex.org/W2803131667","https://openalex.org/W2875525109","https://openalex.org/W2898317118","https://openalex.org/W2946734001","https://openalex.org/W2954709499","https://openalex.org/W2967048389","https://openalex.org/W2971076825","https://openalex.org/W3089446137","https://openalex.org/W3098985293","https://openalex.org/W4291518140","https://openalex.org/W6628915035","https://openalex.org/W6738891590","https://openalex.org/W6744671649"],"related_works":["https://openalex.org/W2913452075","https://openalex.org/W2167278502","https://openalex.org/W2389737178","https://openalex.org/W3005817867","https://openalex.org/W605324233","https://openalex.org/W1566985031","https://openalex.org/W3140034589","https://openalex.org/W2982387199","https://openalex.org/W3037157331","https://openalex.org/W4214947963"],"abstract_inverted_index":{"There":[0,42],"are":[1,43,67,215],"many":[2],"web":[3,26,47,65,157],"applications":[4,27,48,66],"that":[5,17,46,118,147,160,189,207],"have":[6,28,34,49],"security":[7,14,155],"issues":[8],"and":[9,32,40,74,109,217],"reports":[10,45],"from":[11,98],"the":[12,19,24,53,79,87,112,131,144,154,166,169,174,182],"largest":[13],"companies":[15],"indicate":[16],"with":[18,227],"passage":[20],"online":[21],"due":[22],"to":[23,36,58,82,86,94,103,153,221],"pandemic,":[25],"increased":[29],"in":[30],"number":[31],"attackers":[33,57],"begun":[35],"attack":[37,175],"them":[38],"more":[39,105,172],"more.":[41],"even":[44],"come":[50],"first":[51],"as":[52],"preferred":[54],"method":[55,125,186,231],"for":[56,208],"enter":[59],"a":[60],"network.":[61],"The":[62],"most":[63],"attacked":[64],"those":[68,136],"whose":[69],"source":[70,80],"code":[71,81],"is":[72,159],"public,":[73],"then":[75],"anyone":[76],"can":[77,225],"see":[78],"obtain":[83],"unauthorized":[84,107,119,140,198,237],"access":[85,108,134,199],"application.":[88],"In":[89,202],"this":[90,148,185],"article":[91],"we":[92,128,150,190,205,224,234],"want":[93,102],"look":[95],"at":[96,130],"things":[97],"another":[99],"angle.":[100],"We":[101,121],"focus":[104,164],"on":[106,111,165,212],"not":[110,163],"vulnerability":[113,196],"through":[114,194],"which":[115,127,138,195,233],"someone":[116],"obtained":[117],"access.":[120,141],"propose":[122],"an":[123,197],"automatic":[124],"by":[126,232],"determine":[129],"level":[132],"of":[133,143,156,168,181,184],"log":[135],"lines":[137],"indicates":[139],"One":[142],"biggest":[145],"advantages":[146],"method,":[149],"propose,":[151],"brings":[152],"applications,":[158,210],"it":[161],"does":[162],"complexity":[167],"attack,":[170],"but":[171],"if":[173],"exists":[176],"or":[177],"not.":[178],"And":[179],"one":[180],"disadvantages":[183],"would":[187],"be":[188],"cannot":[191],"find":[192],"out":[193],"was":[200],"reached.":[201],"our":[203,230],"tests":[204],"noticed":[206],"some":[209],"depending":[211],"how":[213,218],"they":[214,219],"built":[216],"respond":[220],"user":[222],"requests,":[223],"use":[226],"great":[228],"success":[229],"discover":[235],"these":[236],"accesses.":[238]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
