Detecting Web Application Attacks With Use of Gene Expression Programming

被引:3
作者
Skaruz, Jaroslaw [1 ]
Seredynski, Franciszek [2 ]
机构
[1] Univ Podlasie, Inst Comp Sci, Sienkiewicza 51, PL-08110 Siedlce, Poland
[2] Polish Acad Sci, Polish Japanese Inst Informat Technol, PL-00901 Warsaw, Poland
来源
2009 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-5 | 2009年
关键词
D O I
10.1109/CEC.2009.4983190
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the paper we present a novel approach based on applying a modern metaheuristic Gene Expression Programming (GEP) to detecting web application attacks. This class of attacks relates to malicious activity of an intruder against applications, which use a database for storing data. The application uses SQL to retrieve data from the database and web server mechanisms to put them in a web browser. A poor implementation allows an attacker to modify SQL statements originally developed by a programmer, which leads to stealing or modifying data to which the attacker has not privileges. While the attack consists in modification of SQL queries sent to the database, they are the only one source of information used for detecting attacks. Intrusion detection problem is transformed into classification problem, which the objective is to classify SQL queries between either normal or malicious queries. GEP is used to find a function used for classification of SQL queries. Experimental results are presented on the basis of SQL queries of different length. The findings show that the efficiency of detecting SQL statements representing attacks depends on the length of SQL statements. Additionally we studied the impact of classification threshold on the obtained results.
引用
收藏
页码:2029 / +
页数:2
相关论文
共 50 条
[41]   Semantic security against web application attacks [J].
Razzaq, Abdul ;
Latif, Khalid ;
Ahmad, H. Farooq ;
Hur, Ali ;
Anwar, Zahid ;
Bloodsworth, Peter Charles .
INFORMATION SCIENCES, 2014, 254 :19-38
[42]   Optimizing Gene Expression Programming to Predict Shear Capacity in Corrugated Web Steel Beams [J].
Shrif, Mazen ;
Al-Sadoon, Zaid A. ;
Barakat, Samer ;
Habib, Ahed ;
Mostafa, Omar .
CIVIL ENGINEERING JOURNAL-TEHRAN, 2024, 10 (05) :1370-1385
[43]   A novel model for detecting application layer DDoS attacks [J].
Xie, Yi ;
Yu, Shun-Zheng .
FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, :56-+
[44]   Detecting differences in gene expression [J].
Freeman, T .
MOLECULAR MEDICINE TODAY, 1998, 4 (01) :13-13
[45]   A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks [J].
Kamarudin, Muhammad Hilmi ;
Maple, Carsten ;
Watson, Tim ;
Safa, Nader Sohrabi .
IEEE ACCESS, 2017, 5 :26190-26200
[46]   Development of a Hybrid Web Application Firewall to Prevent Web Based Attacks [J].
Tekerek, Adem ;
Gemci, Cemal ;
Bay, Omer Faruk .
2014 IEEE 8TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2014, :51-54
[47]   Detecting Web Attacks Using Multi-Stage Log Analysis [J].
Moh, Melody ;
Pininti, Santhosh ;
Doddapaneni, Sindhusha ;
Moh, Teng-Sheng .
2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, :733-738
[48]   GENAVi: a shiny web application for gene expression normalization, analysis and visualization [J].
Reyes, Alberto Luiz P. ;
Silva, Tiago C. ;
Coetzee, Simon G. ;
Plummer, Jasmine T. ;
Davis, Brian D. ;
Chen, Stephanie ;
Hazelett, Dennis J. ;
Lawrenson, Kate ;
Berman, Benjamin P. ;
Gayther, Simon A. ;
Jones, Michelle R. .
BMC GENOMICS, 2019, 20 (01)
[49]   GENAVi: a shiny web application for gene expression normalization, analysis and visualization [J].
Alberto Luiz P. Reyes ;
Tiago C. Silva ;
Simon G. Coetzee ;
Jasmine T. Plummer ;
Brian D. Davis ;
Stephanie Chen ;
Dennis J. Hazelett ;
Kate Lawrenson ;
Benjamin P. Berman ;
Simon A. Gayther ;
Michelle R. Jones .
BMC Genomics, 20
[50]   Functional Web component generation for visual Web application programming [J].
Shimomura T. ;
Ikeda K. ;
Takahashi M. .
International Journal of Computers and Applications, 2011, 33 (02) :167-174