A Vector Space Model Approach for Web Attack Classification Using Machine Learning Technique

被引:3
作者
Yadav, B. V. Ram Naresh [1 ]
Satyanarayana, B. [2 ]
Vasumathi, D. [1 ]
机构
[1] JNTUH Coll Engn, Dept CSE, Hyderabad, Telangana, India
[2] Sri Krishna Devaraya Univ, Dept CST, Anantapur, Andhra Prades, India
来源
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3 | 2016年 / 381卷
关键词
Web security; Vector space model; Web attacks; Classification; Accuracy;
D O I
10.1007/978-81-322-2526-3_38
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Web applications usage is increasing in online services in many ways in our day-to-day life. Business service providers have started deploying their business over the web through various e-commerce applications online. The growth of online web application increases the web complexity and vulnerability in terms of security which is a major concern in the current web security research. The extensive growth of various types of web attacks is a severe threat to web security. HTTP requests are usually secret code into a web attack spread through the injection and allow them to perform malicious actions on remote systems to execute arbitrary commands. This paper proposes an efficient approach for web attack classification, using a vector space model approach (VSMA), to improve the detection and classification accuracy. It is able to automatically classify the attacks from valid requests to detect the specific web attacks. The evaluation measure shows high precision and low recall rates than the existing classifiers in comparison.
引用
收藏
页码:363 / 373
页数:11
相关论文
共 17 条
[1]  
Anagnostakis KG, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P129
[2]  
[Anonymous], 2008, WEB APPL SEC STAT PR
[3]  
[Anonymous], 2007, P 18 INT C ECML PKDD
[4]  
[Anonymous], 2012, SYMANTIC SECURITY TH
[5]  
Cova M, 2007, LECT NOTES COMPUT SC, V4637, P63
[6]  
DinhNguyen H., 2013, IEEE, P1
[7]  
Exbrayat M., 2007, P ECML PKDD WARS POL, P53
[8]  
Gollmann Dieter, 2008, Information Security Technical Report, V13, P1, DOI 10.1016/j.istr.2008.02.002
[9]   Pixy: A static analysis tool for detecting Web application vulnerabilities - (Short paper) [J].
Jovanovic, Nenad ;
Kruegel, Christopher ;
Kirda, Engin .
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, :258-+
[10]  
Kruegel Christopher., 2003, P 10 ACM C COMPUTER, P251, DOI 10.1145/948109.948144