Machine learning techniques applied to detect cyber attacks on web applications

被引:36
作者
Choras, Michal [1 ]
Kozik, Rafal
机构
[1] UTP Univ Sci & Technol, Inst Telecommun & Comp Sci, Bydgoszcz, Poland
关键词
Cyber attacks detection; cyber security; application layer; anomaly detection;
D O I
10.1093/jigpal/jzu038
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The increased usage of cloud services, growing number of web applications users, changes in network infrastructure that connects devices running mobile operating systems and constantly evolving network technology cause novel challenges for cyber security. As a result, to counter arising threats, network security mechanisms, sensors and protection schemes also have to evolve, to address the needs and problems of the users. In this article, we focus on countering emerging application layer cyber attacks since those are listed as top threats and the main challenge for network and cyber security. The major contribution of the article is the proposition of machine learning approach to model normal behaviour of application and to detect cyber attacks. The model consists of patterns (in form of Perl Compatible Regular Expressions (PCRE) regular expressions) that are obtained using graph-based segmentation technique and dynamic programming. The model is based on information obtained from HTTP requests generated by client to a web server. We have evaluated our method on CSIC 2010 HTTP Dataset achieving satisfactory results.
引用
收藏
页码:45 / 56
页数:12
相关论文
共 22 条
[1]  
Adaniya M. H. A. C., 2012, IEEE International Conference on Communications (ICC 2012), P1183, DOI 10.1109/ICC.2012.6364088
[2]  
Adetunmbi A.O., 2008, International Journal of Computing and ICT Research, V2, P60
[3]  
[Anonymous], 2011, 2011 7 INT C NETW SE
[4]  
Barthakur P., 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2012), P195, DOI 10.1109/CyberC.2012.40
[5]  
Choras M, 2013, ADV INTELL SYST, V189, P177
[6]   Statistical and signal-based network traffic recognition for anomaly detection [J].
Choras, Michal ;
Saganowski, Lukasz ;
Renk, Rafal ;
Holubowicz, Witold .
EXPERT SYSTEMS, 2012, 29 (03) :232-245
[7]  
Feinstein L, 2003, DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, P303, DOI 10.1109/DISCEX.2003.1194894
[8]   Efficient graph-based image segmentation [J].
Felzenszwalb, PF ;
Huttenlocher, DP .
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2004, 59 (02) :167-181
[9]  
Gopal R.V., 2011, SAE Technical Paper-01-0754, P1
[10]  
Nguyen HT, 2011, LECT NOTES COMPUT SC, V6694, P25, DOI 10.1007/978-3-642-21323-6_4