An adaptive system for detecting malicious queries in web attacks

被引:11
作者
Dong, Ying [1 ]
Zhang, Yuqing [1 ,2 ]
Ma, Hua [2 ,3 ]
Wu, Qianru [4 ]
Liu, Qixu [1 ,2 ]
Wang, Kai [5 ]
Wang, Wenjie [1 ]
机构
[1] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing 101408, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] Xidian Univ, Sch Math & Stat, Xian 710071, Shaanxi, Peoples R China
[4] Alibaba Grp, Secur Dept, Beijing 100026, Peoples R China
[5] Tencent Inc, Zhanlu Lab, Beijing 100080, Peoples R China
基金
中国国家自然科学基金;
关键词
web attacks; adaptive learning; intrusion detection; anomaly detection; SVM; INTRUSION DETECTION SYSTEM; ANOMALY DETECTION; CLASSIFIER; REDUCTION; ALGORITHM; SELECTION; TAXONOMY; FILTER;
D O I
10.1007/s11432-017-9288-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web request query strings (queries), which pass parameters to a referenced resource, are always manipulated by attackers to retrieve sensitive data and even take full control of victim web servers and web applications. However, existing malicious query detection approaches in the literature cannot cope with changing web attacks. In this paper, we introduce a novel adaptive system (AMOD) that can adaptively detect web-based code injection attacks, which are the majority of web attacks, by analyzing queries. We also present a new adaptive learning strategy, called SVM HYBRID, leveraged by our system to minimize manual work. In the evaluation, an up-to-date detection model is trained on a ten-day query dataset collected from an academic institute's web server logs. The evaluation shows our approach overwhelms existing approaches in two respects. Firstly, AMOD outperforms existing web attack detection methods with an F-value of 99.50% and FP rate of 0.001%. Secondly, the total number of malicious queries obtained by SVM HYBRID is 3.07 times that by the popular support vector machine adaptive learning (SVM AL) method. The malicious queries obtained can be used to update the web application firewall (WAF) signature library.
引用
收藏
页数:16
相关论文
共 52 条
[1]   Active Distance-Based Clustering Using K-Medoids [J].
Aghaee, Amin ;
Ghadiri, Mehrdad ;
Baghshah, Mahdieh Soleymani .
ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2016, PT I, 2016, 9651 :253-264
[2]   Contextual information fusion for intrusion detection: a survey and taxonomy [J].
Aleroud, Ahmed ;
Karabatis, George .
KNOWLEDGE AND INFORMATION SYSTEMS, 2017, 52 (03) :563-619
[3]   Phishing environments, techniques, and countermeasures: A survey [J].
Aleroud, Ahmed ;
Zhou, Lina .
COMPUTERS & SECURITY, 2017, 68 :160-196
[4]   Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach [J].
AlEroud, Ahmed F. ;
Karabatis, George .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (02) :207-223
[5]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[6]  
[Anonymous], 2016, Internet security threat report
[7]  
[Anonymous], 2006, Estimation of Dependences Based on Empirical Data, DOI [DOI 10.2307/2988246, 10.2307/2988246]
[8]   HMMPayl: An intrusion detection system based on Hidden Markov Models [J].
Ariu, Davide ;
Tronci, Roberto ;
Giacinto, Giorgio .
COMPUTERS & SECURITY, 2011, 30 (04) :221-241
[9]  
Baram Y, 2004, J MACH LEARN RES, V5, P255
[10]  
Ben-Hur A, 2010, METHODS MOL BIOL, V609, P223, DOI 10.1007/978-1-60327-241-4_13