Offutt, JeffJin, Jing2014-08-282014-08-282013-08https://hdl.handle.net/1920/8805The Internet is rapidly improving as a platform for deploying sophisticated interactive applications especially in Web 2.0. Although the shift from desktop-centric applications brings many benefits to web-based computing and cloud computing, such as efficient com- munication with ubiquitous access and availability, the way that Internet users share and exchange information also opens their own information to security problems. Today, attack- ers conduct malicious activities to routinely track the identities of internet-connected users, steal privacy data, abuse users personal information, and expose the users unwanted data or programs. Although these attackers can also accomplish these goals by other means, the In- ternet has made it much easier for attackers to locate victims, discover sensitive information and initiate unsolicited communication with the victims.97 pagesenCopyright 2013 Jing JinComputer scienceCovert Channel DetectionEvasive AttacksInformation SecurityMachine learningSimilarity MeasurementWeb Bots DetectionTowards Evasive Attacks: Anomaly Detection Resistance Analysis on the InternetDissertation