<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Analysis of the Dynamics of Internet Threats for Corporate Network Web Service</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Dmitry</forename><surname>Kononov</surname></persName>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Institute of Computational Modelling</orgName>
								<orgName type="department" key="dep2">Siberian Branch</orgName>
								<orgName type="institution">Russian Academy of Sciences</orgName>
								<address>
									<addrLine>Akademgorodok 50/44</addrLine>
									<postCode>660125</postCode>
									<settlement>Krasnoyarsk</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sergey</forename><surname>Isaev</surname></persName>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Institute of Computational Modelling</orgName>
								<orgName type="department" key="dep2">Siberian Branch</orgName>
								<orgName type="institution">Russian Academy of Sciences</orgName>
								<address>
									<addrLine>Akademgorodok 50/44</addrLine>
									<postCode>660125</postCode>
									<settlement>Krasnoyarsk</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Analysis of the Dynamics of Internet Threats for Corporate Network Web Service</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">B81B49E34B695C4C3489D7291C518832</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T08:25+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Internet</term>
					<term>security</term>
					<term>web</term>
					<term>threat</term>
					<term>log</term>
					<term>network</term>
					<term>data analysis (D. Kononov) ORCID: 0000-0002-8757-5274 (D. Kononov); 0000-0002-6678-0084 (S. Isaev)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Analyzing web service logs is an important task to ensure the uninterruptible functioning and security for computer systems. When implementing complicated software systems, it is necessary to pay special attention to collecting, storing, processing, and analyzing logs of various services to identify existing and potential security problems. This paper describes an approach to analyzing the dynamics of web services functioning over two years and identifying security risks, as well as impact of the COVID-19 pandemic on the use of Internet services. Recommendations are given to strengthen the protection of web services and reduce cybersecurity risks.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Modern information technologies are used in many areas of economy, including government management systems. The use of web technologies and web systems allows the provision of online services without the need to visit the organization, which is especially important in the case of global pandemics. Also, web services are used in corporate networks of various size, providing access to web mail, private clouds, and other online resources.</p><p>It should be noted that since web systems and web services use the Internet for their work, there are risks associated with information security. Ensuring information security is a complex task which includes a set of measures that must be taken to reduce the risks of threats. An important part is the analysis of the activity logs of web services, which allows detecting web attacks and optimizing hardware settings <ref type="bibr" target="#b0">[1]</ref>. For an adequate assessment of the threat level, it is necessary to involve computer security experts <ref type="bibr" target="#b1">[2]</ref>. In <ref type="bibr" target="#b2">[3]</ref>, it is shown that threats can increase when using various technologies for the development of web services. It is also necessary to analyze the activity of services to identify infrastructure weaknesses (CPU, memory, disk, and network operations) in order to reduce the consequences of increased loads, including hacker attacks. The paper <ref type="bibr" target="#b3">[4]</ref> suggests proactive resource planning using the bandwidth load simulation technology. The analysis of the effectiveness of the protection tools should be made without side effects for the existing infrastructure <ref type="bibr" target="#b4">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related works</head><p>Many works are devoted to analyzing logs of various services to identify security problems. In <ref type="bibr" target="#b5">[6]</ref>, statistical methods are used to analyze system logs to build a system for detecting hidden attacks on the network infrastructure. The authors in <ref type="bibr" target="#b6">[7]</ref> use the graph theory to detect early attacks for various services. In <ref type="bibr" target="#b7">[8]</ref>, a regression analysis using the correlation between the elements of cloud service logs is proposed. Analyzing web server logs allows detecting a wide class of attacks including SQL injection. In similar studies <ref type="bibr" target="#b8">[9]</ref>, the authors use predefined rules to detect SQL injections and XSS attacks, which limits their use to certain types of attacks. A big threat to the functioning of web services is web spiders, which allow the automatic detection of system weaknesses <ref type="bibr" target="#b9">[10]</ref>. As will be shown in this paper, web spiders cause the majority of errors in web services. Various methods are being developed to prevent automated scanning including real-time detection and response <ref type="bibr" target="#b10">[11]</ref>. It should be noted that the COVID-19 pandemic has led to a change in the traffic patterns and usage profile of network and cloud infrastructure. The paper <ref type="bibr" target="#b11">[12]</ref> analyzes the homogeneity of attacks on popular services during remote work in the COVID-19 pandemic, and identifies a list of countries which are the sources of attacks.</p><p>The existing works cover various aspects and methods for analyzing service logs but use short time intervals as data sources, which makes it difficult to assess the dynamics of the ongoing processes. In addition, the analysis is often made only at one level and using one data source, which does not allow assessing the reliability of the results obtained.</p><p>In this research, web services and traffic monitoring systems operating in the corporate network of the Krasnoyarsk Science Center (KSC SB RAS, Russia) are studied. The purpose is to analyze the functioning of web services in dynamics over 2 years, identify potential risks and threats, as well as to create recommendations for improving methods and means of ensuring the protection of Internet services. Another goal of this work is to assess the impact of the COVID-19 pandemic on the use of Internet services and their security.</p><p>In contrast to the existing studies, multiple data sources are used to extract web services data at the network and application layers of the OSI network model <ref type="bibr" target="#b12">[13]</ref>. The analysis is carried out over large time intervals, which makes it possible to assess the dynamics of the web services behavior by hours, days, months, and years. In this paper, the authors consider a potential attack to be a request for a non-existent web service entry point or an unauthorized request for the existing entry point according to web traffic logs, and a request for a non-existent service according to Netflow IP traffic logs. This study continues our research on the security of Internet services in the corporate network <ref type="bibr" target="#b13">[14]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Data sources</head><p>In this paper, we used the following data as data sources for 2019 and 2020: 1) Netflow IP traffic: more than 460 GB, more than 25 billion records; 2) logs from web-services: about 32 GB, more than 128 million records. The analysis was performed using the following software: UNIX CLI tools, GAccess, MaxMind, JSON tools, Python, FlowTools, Microsoft Excel.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">IP Traffic analysis</head><p>To compare the level of activity of web service users, IP traffic data was analyzed using the HTTP and HTTPS protocols (fig. <ref type="figure" target="#fig_0">1</ref>). A 7-day average was used to smooth out the activity peaks during the week. The analysis shows a general trend of increasing the activity of using web services: the average daily traffic for 2019 (224 GB) is 1.5 times lower than in 2020 (329 GB), and the correlation is weak (0.38). While in 2019 the activity increases quite smoothly throughout the year with dips during long weekends, in 2020 there is a sharp decrease in the activity by a factor of 2 at the end of March due to the introduction of lockdown and remote work during the COVID-19 pandemic. The activity returns to its previous levels only in the fall and decreases again by the end of the year against the background of the second wave of COVID-19. The analysis of the activity by days of the week (Fig. <ref type="figure" target="#fig_1">2</ref>) shows that while the overall activity profile in 2020 remains the same (correlation 0.99), there is an approximately 10% increase in the weekend activity, which is likely due to the active use of remote workplaces. The comparative analysis of the use of the HTTP and HTTPS protocols shows an increase in the portion of the latter (from 86% to 91%), which reduces the level of cyber threats. To analyze the use of web services, correlations for 2019 and 2020 of daily download traffic were calculated using NetFlow IP data (complete data) and web service logs (data from a part of hosts). As the proportion of the host traffic with the available activity logs increased from 30% to 48%, the correlation also increased, indicating that the data is correct, and that these sets can be used together for detailed analysis.</p><p>The web usage activity profiles by days of the week based on the IP traffic show little change (correlation 0.84). The annual analysis of the use of the web services of KSC SB RAS in Figure <ref type="figure" target="#fig_2">3</ref> shows a significant increase in the use of its own web services during the transition to remote work in the spring and autumn of 2020.</p><p>The analysis of access attempts to non-existent web services of the KSC SB RAS network using the HTTP and HTTPS protocols for 2019 and 2020 was made (Fig. <ref type="figure" target="#fig_4">4</ref>). During the analyzed period, there was a smooth increase in access attempts using the HTTPS protocol, which is consistent with the general trends in the use of web services. In 2020, the daily number of attacks increased 1.5 times for HTTP and 2.5 times for HTTPS.   The standard deviation σ and variation of cv were calculated for the obtained aggregated data sets:</p><formula xml:id="formula_0">𝜎 = ∑ ( ̅ ) ( ) ; 𝑐 = ̅<label>(1)</label></formula><p>For the access attempts via the HTTP protocol, the variation coefficients were 1.76 and 0.65 for 2019 and 2020, respectively, and for the HTTPS protocol: 0.61 and 0.35. Thus, we can conclude that the number of intensive attacks decreased in 2020 as compared to 2019, while the intensity of HTTP attacks remained approximately twice as high. The calculated variation coefficient parameters allow us to build attack detection models, as well as to simulate the normal operation of web services.</p><p>We also analyzed the IP traffic data to identify the dynamics of changes in the popularity of individual Internet services (Table <ref type="table" target="#tab_1">1</ref>). It should be noted that, in general, the set of services used in most attacks and disguised as malware remained unchanged: Telnet and Microsoft-DS Active Directory protocols are by far the leading ones, and can be used to access data on a remote computer. The following protocols significantly changed their position in the rating: Session Initiation Protocol (SIP) -plus 7 positions and iTunes Radio streams -minus 8 positions. The increasing number of the SIP attacks can be explained by the popularity of video conferencing during the COVID-19 pandemic. The fifth position of one of the most attacked, according to security experts, is the SSH protocol which can be explained by an efficiently functioning system for preventing password guessing and blocking hosts on the corporate network edge router.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">WWW data analysis</head><p>This paper also analyzes the activity logs of web resources for 2019 and 2020. The analysis shows the presence of requests and frequency of errors by days of the week, and hours of the day, as well as an increase in the number of requests from 52.5 million (2019) to 76 million (2020) due to the development of web services and an increase in their audience.</p><p>In this work, all the web service requests are divided into two groups: legitimate and erroneous according to the HTTP protocol specification <ref type="bibr">[15]</ref>. Legitimate requests are executed by web applications and web services in normal mode without causing errors (response code 1XX, 2XX, 3XX). Erroneous requests (or errors), in turn, are divided into two groups: client errors which occur due to an incorrect web client (response code 4XX), and server errors which occur on the server side due to an incorrect client request or internal errors (response code 5XX). As shown in Table <ref type="table" target="#tab_2">2</ref>, in 2019 and 2020, the first two places in the number of requests belong to Russia and the United States. Russia accounts for more than 80% of all the requests. In 2020, France came third, displacing Germany and Ukraine by one position. The Netherlands and Canada moved 3 positions up. It is noteworthy that the proportion of requests from China decreased by a half, and the position of the country dropped by 4 points. The high positions of the US, France, and Germany can be explained by the presence of many hosting providers in these countries, which are used by web spider owners to scan hosts on the Internet. The most popular browsers are: Chrome -40% in 2019 and 43% in 2020, Firefox -14% and 11%, respectively. Web spiders account for 7% of all the requests in 2019 and 6% in 2020 with an error rate of 62% in 2019 and 58% in 2020.</p><p>Figure <ref type="figure" target="#fig_5">5</ref> shows the trend graphs of the number of requests in 2019 and 2020. The analysis shows the dependence of the number of requests on holidays when the number of requests decreases. The activity of requests remains high from Monday to Friday, and on Saturday and Sunday there is a decrease of up to 40%, indicating the use of web services mainly on weekdays. Figure <ref type="figure" target="#fig_6">6</ref> shows trend graphs of the number of errors in 2019 and 2020. The peak values on the graphs indicate the presence of abnormal activity. As mentioned above, most of the errors are caused by the activity of web spiders, which can be divided into three groups: search, research, and malicious. Search spiders belong to search engines (Google, Bing, Yandex) and scan web resources to include pages in search results. Due to the improper configuration of web resources, search engine spiders can follow links that are not public, causing errors. Research spiders belong to public, academic, or commercial organizations which collect data and monitor the Internet. Malicious spiders belong to criminal groups and scan for the known vulnerabilities in web resources, and if they are present, the spiders perform attacks in the form of automatic exploitation of vulnerabilities with the execution of a malicious code on the server. As a rule, this scanning is performed for popular open source content management systems (CMS), online stores, forums, and Internet of Things (IoT) devices. Figure <ref type="figure" target="#fig_7">7</ref> shows a graph of the number of requests and errors by hours in 2019 and 2020. As you can see from the graphs, the number of requests per hour increases proportionally due to the increase in the total annual number of requests. The highest activity is observed during working hours from 9:00 to 18:00 (a small dip can be seen at lunchtime at 13:00), and in the evening the activity decreases until 22:00. In the error graph, one can see that for both years there is a rather high number of errors at night, which indicates the presence of constant activity of web spiders and bots performing scanning of web resources. This constant activity remains at about the same level both in 2019 and 2020. The correlation coefficient between the requests and the errors was calculated: 0.35 (2019), and 0.38 (2020), indicating a weak relationship between the requests and the errors due to the incorrect operation of web services. However, most of the errors are caused by scans and web spider attacks. The correlation coefficient for the requests in 2019 and 2020 is 0.99, and for the errors it is 0.96. As one can see from the graphs, the profile of requests and errors persists in 2019 and 2020. The average number of the errors in 2020 increased by more than 60%. The variation coefficient in 2019 was 1.99, and in 2020 it was 1.01, indicating a decrease in the number of intensive attacks on web resources by about 2 times. This agrees with the above analysis of scans on the HTTP (80) and HTTPS (443) protocols. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Recommendations</head><p>After the analysis, the following recommendations were formulated to strengthen the security of Internet services. (1) We recommend adding TCP ports from Table <ref type="table" target="#tab_1">1</ref> to the intrusion detection system and using the calculated standard deviation parameters for different services to distinguish the background port scanning activity from targeted attacks. (2) Web moderators have to regularly update web resources which use popular systems: content management systems (CMS), forums, third-party modules. The study of the constant malicious activity of web spiders shows an increased interest towards vulnerabilities in old versions of these systems. (3) It is necessary to integrate automatic downloading of malicious IP address lists obtained from web resource logs into the threat blocking system on the edge router. This measure will allow blocking hosts not only for web services, but also for the entire range of IP addresses of the autonomous system (AS) when a malicious activity is detected. (4) The most effective way to prevent security threats is to whitelist access to the administrative interfaces of the systems using IP addresses and/or VPN services.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Conclusion</head><p>In this paper, we analyzed the dynamics of using web-services of the corporate network of Krasnoyarsk Science Center (Russia). The main parameters of the web traffic are revealed; the sources of Internet threats and dynamics of their behavior over 2 years are clarified. The calculated parameters of the distributions allow building models for detecting attacks, as well as for simulating the normal operation mode of the web services. Based on the results, we formulated recommendations to strengthen the security protection of web services, which should minimize cybersecurity risks.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: The daily amount of the incoming web services traffic in bytes</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: The ratio of the relative use of web services by days of the week (1 -Mon, 7 -Sun)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: The daily response traffic of the web services in bytes for 2019 and 2020</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: The number of attempts to access the web services in 2020 by days</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: The daily number of the requests for web services in 2019 and 2020</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: The daily number of errors for web services in 2019 and 2020</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: The number of requests and errors by hours</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head></head><label></label><figDesc>01.02 01.03 01.04 01.05 01.06 01.07 01.08 01.09 01.10 01.11 01</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1</head><label>1</label><figDesc>Rating of threats to Internet services</figDesc><table><row><cell>Rank in</cell><cell>Protocol name/threat</cell><cell cols="2">Port Proportion</cell><cell>Rank</cell></row><row><cell>2020</cell><cell></cell><cell></cell><cell>in Top 50</cell><cell>change</cell></row><row><cell>1</cell><cell>Telnet protocol/Trojan</cell><cell>23</cell><cell>18.3%</cell><cell>0</cell></row><row><cell>2</cell><cell>Microsoft-DS Active Directory/threat</cell><cell>445</cell><cell>18.0%</cell><cell>0</cell></row><row><cell>3</cell><cell>Microsoft-SQL-Server/threat</cell><cell>1433</cell><cell>7.2%</cell><cell>0</cell></row><row><cell>4</cell><cell>Session Initiation Protocol (SIP)</cell><cell>5060</cell><cell>5.9%</cell><cell>7</cell></row><row><cell>5</cell><cell>Secure Shell (SSH) Protocol/Trojan</cell><cell>22</cell><cell>4.4%</cell><cell>-3</cell></row><row><cell>6</cell><cell>Hypertext Transfer Protocol (HTTP)/threat</cell><cell>80</cell><cell>4.2%</cell><cell>-2</cell></row><row><cell>7</cell><cell>Microsoft Terminal Server (RDP)</cell><cell>3389</cell><cell>3.3%</cell><cell>3</cell></row><row><cell>8</cell><cell>HTTP Alternate/threat</cell><cell>8080</cell><cell>2.7%</cell><cell>-1</cell></row><row><cell>9</cell><cell>Torpark -Onion routing/threat</cell><cell>81</cell><cell>2.5%</cell><cell>-1</cell></row><row><cell>10</cell><cell>Personal Agent/threat</cell><cell>5555</cell><cell>2.1%</cell><cell>2</cell></row><row><cell>11</cell><cell>iTunes Radio streams, JSON RPC default port</cell><cell>8545</cell><cell>2.0%</cell><cell>-2</cell></row><row><cell>12</cell><cell>Hypertext Transfer Protocol over SSL / threat</cell><cell>443</cell><cell>1.9%</cell><cell>3</cell></row><row><cell>13</cell><cell>iTunes Radio streams, MikroTik Winbox</cell><cell>8291</cell><cell>1.4%</cell><cell>-8</cell></row><row><cell>14</cell><cell>Network Time Protocol / threat</cell><cell>123</cell><cell>1.3%</cell><cell>5</cell></row><row><cell>15</cell><cell>Asterisk Manager Interface (VoIP)</cell><cell>5038</cell><cell>1.3%</cell><cell>1</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2</head><label>2</label><figDesc>Ranking of the countries by the requests in 2019 and 2020</figDesc><table><row><cell>Rank</cell><cell>2019</cell><cell>%</cell><cell>2020</cell><cell>%</cell><cell>Rank</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>change</cell></row><row><cell>1</cell><cell>Russia</cell><cell>81.97</cell><cell>Russia</cell><cell>83.53</cell><cell>0</cell></row><row><cell>2</cell><cell>United States</cell><cell>7.14</cell><cell>United States</cell><cell>5.57</cell><cell>0</cell></row><row><cell>3</cell><cell>Germany</cell><cell>1.91</cell><cell>France</cell><cell>1.89</cell><cell>2</cell></row><row><cell>4</cell><cell>Ukraine</cell><cell>1.30</cell><cell>Germany</cell><cell>1.58</cell><cell>-1</cell></row><row><cell>5</cell><cell>France</cell><cell>1.19</cell><cell>Ukraine</cell><cell>1.00</cell><cell>-1</cell></row><row><cell>6</cell><cell>China</cell><cell>1.08</cell><cell>Netherlands</cell><cell>0.82</cell><cell>3</cell></row><row><cell>7</cell><cell>United Kingdom</cell><cell>0.86</cell><cell>Canada</cell><cell>0.77</cell><cell>3</cell></row><row><cell>8</cell><cell>Ireland</cell><cell>0.81</cell><cell>United Kingdom</cell><cell>0.74</cell><cell>-1</cell></row><row><cell>9</cell><cell>Netherlands</cell><cell>0.56</cell><cell>Unknown</cell><cell>0.66</cell><cell>3</cell></row><row><cell>10</cell><cell>Canada</cell><cell>0.28</cell><cell>CN China</cell><cell>0.52</cell><cell>-4</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_0">06.01 06.02 06.03 06.04 06.05 06.06 06.07 06.08 06.09 06.10 06.11 06.12</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">System log clustering approaches for cyber security applications: A survey</title>
		<author>
			<persName><forename type="first">M</forename><surname>Landauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Skopik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Urzenberger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rauber</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2020.101739</idno>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">92</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Discovering and utilising expert knowledge from security event logs</title>
		<author>
			<persName><forename type="first">S</forename><surname>Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Parkinson</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jisa.2019.102375</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Security and Applications</title>
		<imprint>
			<biblScope unit="volume">48</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A fine-grained classification and security analysis of web-based virtual machine vulnerabilities</title>
		<author>
			<persName><forename type="first">F</forename><surname>Yilmaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sridhar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mohanty</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2021.102246</idno>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">105</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Proactive planning of bandwidth resource using simulation-based what-if predictions for Web services in the cloud</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Frontiers of Computer Science</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page">151201</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Complex log file synthesis for rapid sandbox-benchmarking of security-and computer network analysis tools</title>
		<author>
			<persName><forename type="first">M</forename><surname>Wurzenberger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Skopik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ettanni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Scherrer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">60</biblScope>
			<biblScope unit="page" from="13" to="33" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">LEAPS: Detecting camouflaged attacks with statistical learning guided by program analysis</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Gu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Pei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks</title>
				<imprint>
			<date type="published" when="2015">2015. 2015</date>
			<biblScope unit="page" from="57" to="68" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data</title>
		<author>
			<persName><forename type="first">A</forename><surname>Oprea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Yen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">H</forename><surname>Chin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Alrwais</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks</title>
				<imprint>
			<date type="published" when="2015">2015. 2015</date>
			<biblScope unit="page" from="45" to="56" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Metric selection and anomaly detection for cloud operations using log and metric correlation analysis</title>
		<author>
			<persName><forename type="first">M</forename><surname>Farshchi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-G</forename><surname>Schneider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Weber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Grundy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Systems and Software</title>
		<imprint>
			<biblScope unit="volume">137</biblScope>
			<biblScope unit="page" from="531" to="549" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Detection of attack-targeted scans from the Apache HTTP Server access logs</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">B</forename><surname>Seyyar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">O</forename><surname>Catak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Gul</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied Computing and Informatics</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="28" to="36" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Bot Detection Model using User Agent and User Behavior for Web Log Analysis</title>
		<author>
			<persName><forename type="first">T</forename><surname>Tanaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Niibori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="volume">176</biblScope>
			<biblScope unit="page" from="1621" to="1625" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Efficient on-the-fly Web bot detection</title>
		<author>
			<persName><forename type="first">G</forename><surname>Suchacka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cabri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rovetta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Masulli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge-Based Systems</title>
		<imprint>
			<biblScope unit="volume">223</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A Comparative Analysis of Honeypots on Different Cloud Platforms</title>
		<author>
			<persName><forename type="first">C</forename><surname>Kelly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pitropakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mylonas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mckeown</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">J</forename><surname>Buchanan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page">2433</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<idno>ISO/IEC 7498-1:1994</idno>
		<ptr target="https://www.iso.org/ru/standard/20269.html" />
		<title level="m">Open Systems Interconnection: The Basic Model</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Analysis of Internet Service Log Data to Assess the Level of Cyber-threats in the Corporate Network</title>
		<author>
			<persName><forename type="first">S</forename><surname>Isaev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kononov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Malyshev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2727</biblScope>
			<biblScope unit="page" from="16" to="24" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
