@incollection{, B2400B678F06EAB4D02D5804DB877A41 , author={{Dr. K.SudheerKumar} and {D.Srikar} and {CH.S.V.V.S.NMurthy} and {Jawaharlal Nehru Technical University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}12101116 } @incollection{b0, , title={{Robust Defenses for Cross-Site Request Forgery}} , author={{ CBarth } and { JCJackson } and { Mitchell }} , booktitle={{Proceedings of 15th ACM Conference, CCS}} 15th ACM Conference, CCS , year={2008} } @book{b1, , title={{XSS Attacks: Cross Site Scripting Exploits and Defense}} , author={{ SethFogie } and { JeremiahGrossman } and { RobertHansen } and { AntonRager } and { PetkoDPetkov }} , year={2007} , publisher={Syngress} } @incollection{b2, , title={{Preventing Cross Site Request Forgery Attacks}} , author={{ NJovanovic } and { EKirda } and { CKruegel }} , booktitle={{Securecommand Workshops}} , year={2006. Aug. 28 2006-Sept. 1 2006} } @incollection{b3, , title={{Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications}} , author={{ DavideBalzarotti } and { MarcoCova } and { VikaFelmetsger } and { NenadJovanovic } and { EnginKirda } and { ChristopherKruegel } and { ยง } and { Giovannivigna }} , booktitle={{Proceedings of the IEEE Symposium on Security and Privacy}} the IEEE Symposium on Security and PrivacyOakland, CA , year={May 2008} } @book{b4, , title={{Computer World surveillance and Artificial Intelligence: From Fixing the Plumbing to Smart Water}} , author={{ CalLandwehr }} , year={September/October 2008} , publisher={IEEE} 3 } @book{b5, , title={{}} , author={{ BruceSchneier } and { OnSecurity }} , year={2008} } @book{b6, , title={{}} , author={{ DouglasCorckford }} , year={2006} , address={Ajax Security} } @incollection{b7, , title={{Learning DFA representations of HTTP for protecting web applications}} , author={{ KennethIngham } and { AnilSomayaji } and { JohnBurge } and { StephanieForrest }} , journal={{Journal of Computer Networks}} 51 5 , year={2007} } @incollection{b8, , title={{Exploiting Execution Context for the Detection of Anomalous System Calls}} , author={{ DarranMutz } and { WilliamRobertson } and { GiovanniVigna } and { RichardKemmerer }} , booktitle={{Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID)}} the International Symposium on Recent Advances in Intrusion Detection (RAID)Gold Coast Australia , year={2007} } @book{b9, , title={{An Approach for the Anomaly-based Detection of State Violations in Web Applications}} , author={{ MarcoCova } and { DavideBalzarotti } and { ViktoriaFelmetsger } and { GiovanniVignaSwaddler }} } @incollection{b10, , title={{Effective Anomaly Detection with Scarce Training Data}} , author={{ FedericoRobertson } and { Christopher Kruegel GiovanniMaggi } and { Vigna }} , booktitle={{Proceedings of the Network and Distributed System. Security Symposium (NDSS)}} the Network and Distributed System. Security Symposium (NDSS)San Diego, CA , year={February 010} } @book{b11, , title={{Anomaly based intrusion detection systems}} , author={{ BMorel }} , year={2011} , publisher={Intech} , note={chapter. intrusion detection systems} } @book{b12, , title={{Cross-Site Request Forgeries: Exploitation and Prevention}} , author={{ WilliamZeller } and { EdwardWFelten }} , year={2008} , address={Princeton} } @incollection{b13, , title={{The foundations of statistical inferences, 1962. synthesis of reliable organisms from unreliable components}} , author={{ LJSavage }} , booktitle={{Annals of Math Studies}} , editor={ CEShannon JMccarthy } , publisher={Princeton Univ. Press} , year={1956} 34 } @book{b14, , title={{NETL, a System for Representing and Using real World Knowledge}} , author={{ ScottFahlman }} , year={1979} , publisher={MIT Press} , address={Cambridge, MA} } @book{b15, , title={{Knowledge Based Systems}} , author={{ RAkerkar } and { PSSajja }} , year={2009} , publisher={Jones and Bartlett} } @book{b16, , author={{ SEFahlman }} , title={{The Scone Knowledge Base (homepage)}} } @book{b17, , title={{Probabilistic Reasoning in Intelligent systems: Networks of Plausible Inference}} , author={{ BlakeShepard }} , year={2005. 1988} , publisher={Morgan Kaufmann} , address={San Mateo, CA} , note={A Knowledge-Based Approach to Network Security} }