{"id":"https://openalex.org/W7138934415","doi":"https://doi.org/10.1109/globecom59602.2025.11432085","title":"Fuzzydetect: Sliding Window-Driven Fuzzy Hashing with SVM Classification for Resilient Web Fuzzing Attack Detection","display_name":"Fuzzydetect: Sliding Window-Driven Fuzzy Hashing with SVM Classification for Resilient Web Fuzzing Attack Detection","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7138934415","doi":"https://doi.org/10.1109/globecom59602.2025.11432085"},"language":null,"primary_location":{"id":"doi:10.1109/globecom59602.2025.11432085","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432085","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101875247","display_name":"Hang Yin","orcid":"https://orcid.org/0000-0003-4605-8008"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hang Yin","raw_affiliation_strings":["University of Science and Technology of China,School of Cyber Science and Technology,Hefei,China,230027"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,School of Cyber Science and Technology,Hefei,China,230027","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121665558","display_name":"Xuanbo Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuanbo Huang","raw_affiliation_strings":["University of Science and Technology of China,School of Cyber Science and Technology,Hefei,China,230027"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,School of Cyber Science and Technology,Hefei,China,230027","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004027189","display_name":"Lutong Chen","orcid":"https://orcid.org/0000-0001-6044-9457"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lutong Chen","raw_affiliation_strings":["University of Science and Technology of China,Network and Information Center,Hefei,China,230026"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,Network and Information Center,Hefei,China,230026","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102487066","display_name":"Zixu Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zixu Huang","raw_affiliation_strings":["University of Science and Technology of China,School of Cyber Science and Technology,Hefei,China,230027"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,School of Cyber Science and Technology,Hefei,China,230027","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130083990","display_name":"Ruiqing Li","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiqing Li","raw_affiliation_strings":["University of Science and Technology of China,School of Cyber Science and Technology,Hefei,China,230027"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,School of Cyber Science and Technology,Hefei,China,230027","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100751832","display_name":"Ke Xue","orcid":"https://orcid.org/0000-0002-7528-180X"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaiping Xue","raw_affiliation_strings":["University of Science and Technology of China,School of Cyber Science and Technology,Hefei,China,230027"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,School of Cyber Science and Technology,Hefei,China,230027","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101875247"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76731561,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3801","last_page":"3806"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.4413999915122986,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.4413999915122986,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.19589999318122864,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.10679999738931656,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5913000106811523},{"id":"https://openalex.org/keywords/sliding-window-protocol","display_name":"Sliding window protocol","score":0.5415999889373779},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4471000134944916},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4375},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4052000045776367},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.3986000120639801},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.3513000011444092},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.3319999873638153},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.32280001044273376}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7817999720573425},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5913000106811523},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5892999768257141},{"id":"https://openalex.org/C102392041","wikidata":"https://www.wikidata.org/wiki/Q592860","display_name":"Sliding window protocol","level":3,"score":0.5415999889373779},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45339998602867126},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4471000134944916},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4375},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41670000553131104},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4052000045776367},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.3986000120639801},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.3513000011444092},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.3319999873638153},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.32280001044273376},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3068000078201294},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.3021000027656555},{"id":"https://openalex.org/C2777672014","wikidata":"https://www.wikidata.org/wiki/Q1172573","display_name":"Web traffic","level":3,"score":0.3003999888896942},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.29989999532699585},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.29249998927116394},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.28290000557899475},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.26829999685287476},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.2671000063419342},{"id":"https://openalex.org/C4641261","wikidata":"https://www.wikidata.org/wiki/Q11681085","display_name":"Face detection","level":4,"score":0.26429998874664307},{"id":"https://openalex.org/C74270461","wikidata":"https://www.wikidata.org/wiki/Q1625299","display_name":"Locality-sensitive hashing","level":4,"score":0.26260000467300415},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.25429999828338623},{"id":"https://openalex.org/C2778751112","wikidata":"https://www.wikidata.org/wiki/Q835016","display_name":"Window (computing)","level":2,"score":0.2513999938964844}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom59602.2025.11432085","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432085","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2166275707","https://openalex.org/W2914019150","https://openalex.org/W3000367805","https://openalex.org/W3013549383","https://openalex.org/W3082712634","https://openalex.org/W3091945716","https://openalex.org/W3107757457","https://openalex.org/W3119431621","https://openalex.org/W3119689710","https://openalex.org/W3133528530","https://openalex.org/W3144995534","https://openalex.org/W3203052926","https://openalex.org/W3208124018","https://openalex.org/W4315798510","https://openalex.org/W4362639200","https://openalex.org/W4388019037","https://openalex.org/W4396690684"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,114],"continuous":[2],"evolution":[3],"of":[4,122,125,129],"web":[5],"application":[6],"attack":[7],"techniques,":[8],"attackers":[9],"have":[10],"widely":[11],"adopted":[12],"fuzzing-based":[13],"penetration":[14],"testing.":[15],"However,":[16],"traditional":[17],"rule-based":[18],"feature-matching":[19],"detection":[20,25,51,139],"mechanisms":[21],"and":[22,37,41,69,80,127],"machine":[23],"learning-based":[24],"systems":[26],"face":[27],"challenges":[28],"including":[29],"ineffective":[30],"malicious":[31,55,91],"traffic":[32,68],"with":[33,107,131],"local":[34],"mutations,":[35],"complex":[36],"time-consuming":[38],"model":[39],"training,":[40],"excessive":[42],"server":[43],"load.":[44],"This":[45],"paper":[46],"introduces":[47],"Fuzzydetect,":[48],"a":[49,61,118,132],"novel":[50],"framework":[52],"for":[53],"identifying":[54],"HTTP":[56],"fuzzing":[57],"traffic.":[58,95],"It":[59],"applies":[60],"sliding":[62],"window":[63],"mechanism":[64],"to":[65,73,89,103],"segment":[66],"network":[67],"uses":[70],"fuzzy":[71],"hashing":[72],"capture":[74],"similarity":[75,82],"patterns":[76],"in":[77],"consecutive":[78],"packets":[79],"compute":[81],"scores,":[83],"utilizing":[84],"Support":[85],"Vector":[86],"Machine":[87],"(SVM)":[88],"distinguish":[90],"activity":[92],"from":[93],"benign":[94],"We":[96],"conduct":[97],"comprehensive":[98],"experiments":[99],"using":[100],"mainstream":[101],"datasets":[102],"evaluate":[104],"our":[105],"system":[106,116],"existing":[108],"solutions.":[109],"Experimental":[110],"results":[111],"demonstrate":[112],"that":[113,136],"proposed":[115],"achieves":[117],"True":[119],"Positive":[120],"Rate":[121],"99.64%,":[123],"accuracy":[124],"98.2%,":[126],"F1-score":[128],"0.9867,":[130],"faster":[133],"processing":[134],"speed":[135],"satisfies":[137],"real-time":[138],"requirements.":[140]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-03-20T00:00:00"}
