Advanced Hybrid Technique in Detecting Cloud Web Application's Attacks

被引:0
|
作者
Amar, Meryem [1 ]
Lemoudden, Mouad [1 ]
El Ouahidi, Bouabid [1 ]
机构
[1] Mohammed V Univ, IPSS, Rabat, Morocco
来源
MACHINE LEARNING FOR NETWORKING | 2019年 / 11407卷
关键词
Attack-detection; Cloud; IDS; Machine learning; Security; Similarities; LEARNING ALGORITHMS; SECURITY;
D O I
10.1007/978-3-030-19945-6_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently cloud computing has emerged the IT world. It eventually promoted the acquisition of resources and services as needed, but it has also instilled fear and user's renunciations. However, Machine learning processing has proven high robustness in solving security flaws and reducing false alarm rates in detecting attacks. This paper, proposes a hybrid system that does not only labels behaviors based on machine learning algorithms using both misuse and anomaly-detection, but also highlights correlations between network relevant features, speeds up the updating of signatures dictionary and upgrades the analysis of user behavior.
引用
收藏
页码:79 / 97
页数:19
相关论文
共 50 条
  • [31] An adaptive system for detecting malicious queries in web attacks
    Ying DONG
    Yuqing ZHANG
    Hua MA
    Qianru WU
    Qixu LIU
    Kai WANG
    Wenjie WANG
    ScienceChina(InformationSciences), 2018, 61 (03) : 175 - 190
  • [32] An adaptive system for detecting malicious queries in web attacks
    Ying Dong
    Yuqing Zhang
    Hua Ma
    Qianru Wu
    Qixu Liu
    Kai Wang
    Wenjie Wang
    Science China Information Sciences, 2018, 61
  • [33] Applications for Detecting XSS Attacks on Different Web Platforms
    Baykara, Muhammet
    Guclu, Sebahattin
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 287 - 292
  • [34] Analysis of SQL injection attacks in the cloud and in WEB applications
    Kumar, Animesh
    Dutta, Sandip
    Pranav, Prashant
    SECURITY AND PRIVACY, 2024, 7 (03)
  • [35] A hybrid feature-selection approach for finding the digital evidence of web application attacks
    Babiker, Mohammed
    Karaarslan, Enis
    Hoscan, Yasar
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (06) : 4102 - 4117
  • [36] Survey of Web Application Vulnerability Attacks
    AlKhurafi, Ossama B.
    AlAhmad, Mohammad A.
    2015 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2015, : 154 - 158
  • [37] Web-Application Attacks: A Survey
    Khali, Manju
    Sangwan, Parikshit
    Vaishali
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2187 - 2191
  • [38] Detecting Application-layer Attacks Based on User's Application-layer Behaviors
    Xie, Bailin
    Jiang, Shengyi
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 607 - 612
  • [39] Application study on detecting multilayer cloud's properties by satellite data
    Liu, J
    Zhu, YJ
    Zhao, BL
    Dong, CH
    JOURNAL OF INFRARED AND MILLIMETER WAVES, 2004, 23 (06) : 408 - 412
  • [40] Detecting Worm Attacks in Cloud Computing Environment: Proof of Concept
    Kanaker, Hasan Mahmoud
    Saudi, Madihah Mohd
    Marhusin, Mohd Fadzli
    2014 IEEE 5TH CONTROL AND SYSTEM GRADUATE RESEARCH COLLOQUIUM (ICSGRC), 2014, : 253 - 256