Using Web Server Logs to Identify and Comprehend Anomalous User Activity

被引:2
作者
Benova, Lenka [1 ]
Hudec, Ladislav [1 ]
机构
[1] Fac Informat & Informat Technol, Inst Comp Engn & Appl Informat, Bratislava, Slovakia
来源
2023 17TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, CONTEL | 2023年
关键词
anomaly detection; web server; isolation forest; network logs; user behaviour; clustering; DBSCAN;
D O I
10.1109/CONTEL58387.2023.10199092
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This research paper presents a study for identifying user anomalies in large datasets of web server requests. Using a cybersecurity company's network of web servers as a case study, we propose a technique for analyzing user activity in NGINX logs. The proposed method does not require a labeled dataset and is capable of efficiently identifying different user anomalies in large datasets with millions of daily requests. The results of the analysis provided a deeper understanding of user behavior when seeking updates through web requests and aided in interpreting the findings. Clustering the anomalies helped to produce typical clusters and further supported the interpretation of the results. This work provides valuable insights into user behavior in web server networks and highlights the importance of efficient anomaly detection techniques in large datasets. The findings have potential real-world applications in the field of cybersecurity, particularly in providing network security analysts with an automated and more objective approach to threat analysis. This study showcases the importance of automated methods for analyzing user activity in web server networks and provides a more objective and efficient approach to detecting user anomalies in large datasets. This approach contributes to the development of more effective and precise cybersecurity systems, ultimately improving the protection of network infrastructures from malicious attacks.
引用
收藏
页数:8
相关论文
共 15 条
[1]  
Benova L., 2022, 2022 IEEE ZOOMING IN, P1
[2]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[3]   LogLens: A Real-time Log Analysis System [J].
Debnath, Biplob ;
Solaimani, Mohiuddin ;
Gulzar, Muhammad Ali ;
Arora, Nipun ;
Lumezanu, Cristian ;
Xu, Jianwu ;
Zong, Bo ;
Zhang, Hui ;
Jiang, Guofei ;
Khan, Latifur .
2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, :1052-1062
[4]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[5]  
Ester M., 1996, Proc. 2nd Int. Conf. on Knowledge Discovery and Data Mining, P226, DOI DOI 10.5555/3001460.3001507
[6]  
Gao Y, 2017, 2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), P1352, DOI 10.1109/ICCT.2017.8359854
[7]   LogMine: Fast Pattern Recognition for Log Analytics [J].
Hamooni, Hossein ;
Debnath, Biplob ;
Xu, Jianwu ;
Zhang, Hui ;
Jiang, Guofei ;
Mueen, Abdullah .
CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2016, :1573-1582
[8]  
Hinton GE., 2002, Advances in Neural Information Processing Systems, V15
[9]   A survey of deep learning-based network anomaly detection [J].
Kwon, Donghwoon ;
Kim, Hyunjoo ;
Kim, Jinoh ;
Suh, Sang C. ;
Kim, Ikkyun ;
Kim, Kuinam J. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1) :949-961
[10]   Log Clustering based Problem Identification for Online Service Systems [J].
Lin, Qingwei ;
Zhang, Hongyu ;
Lou, Jian-Guang ;
Zhang, Yu ;
Chen, Xuewei .
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C), 2016, :102-111