Classification on Web Application Requests

被引:2
作者
Gharibeh, Samar [1 ]
Melhem, Shatha [1 ]
Najadat, Hassan [1 ]
机构
[1] Jordan Univ Sci & Technol, Dept Comp Informat Syst, Irbid, Jordan
来源
2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS) | 2020年
关键词
Web application attacks; Support Vector Machine; Decision Tree; Logistic Regression; Random Forest; HTTP DATASETCSIC 2010;
D O I
10.1109/ICICS49469.2020.239537
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This Technology has become ubiquitous and growing, web applications are one of the examples on technology, which are widely used, and deals with a sensitive and huge amount of data, for that these web applications have become a target for many attackers for financial gain, infiltration data, distort the reputation of application, or even for fun. Therefore, it becomes a need to protect web-based applications from attacks, whether known or unknown. This paper discusses the methods of classifying requests in normal and abnormal. It depends on measuring the accuracy of each classification method to know which method will be the best in classifying applications. HTTP DATASET CSIC 2010 contains 61065 of web requests automatically generated, it was developed at the information security institute of Spanish Research National Council CISC, this requests generated from an e-commerce web application, where users register by providing some private information and buy items by their shopping cart. The goal of using this dataset is to present machine-learning techniques in the classifying and predicting the HTTP requests as normal or anomalous traffic. Four classifiers approaches were utilized including: Support Vector Machine (SVM), Decision Trees (DT), Logistic Regression (LR), and Random Forest (RF).
引用
收藏
页码:033 / 037
页数:5
相关论文
共 16 条
[1]  
Alkasassbeh M, 2016, INT J ADV COMPUT SC, V7, P436
[2]  
Althubiti S., 2017, KSU C CYB ED RES PRA
[3]  
[Anonymous], 2017, P 2017 4 INT C SIGNA
[4]   DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning [J].
Asad, Muhammad ;
Asim, Muhammad ;
Javed, Talha ;
Beg, Mirza O. ;
Mujtaba, Hasan ;
Abbas, Sohail .
COMPUTER JOURNAL, 2020, 63 (07) :983-994
[5]   Web Application Attacks Detection Using Machine Learning Techniques [J].
Betarte, Gustavo ;
Martinez, Rodrigo ;
Pardo, Alvaro .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, :1065-1072
[6]  
Dogru N., 2018, LEARN TECHN C L T, DOI [10.1109/lt.2018.8368509, DOI 10.1109/LT.2018.8368509]
[7]  
Epp N, 2017, ANOMALY BASED WEB AP
[8]  
Ito M., 2018, IEEE 14 INT C SIGN P, DOI [10.1109/cspa.2018.8368694, DOI 10.1109/CSPA.2018.8368694]
[9]  
Johari R., 2012, COMMUNICATION SYSTEM, DOI [10.1109/csnt.2012.104, DOI 10.1109/CSNT.2012.104]
[10]  
Kaur G., 2018, DETECTING BLIND CROS