DocumentCode :
141755
Title :
Analysis of HTTP Requests for Anomaly Detection of Web Attacks
Author :
Zolotukhin, Mikhail ; Hamalainen, Timo ; Kokkonen, Tero ; Siltanen, Jarmo
Author_Institution :
Dept. of Math. Inf. Technol., Univ. of Jyvaskyla, Jyvaskyla, Finland
fYear :
2014
fDate :
24-27 Aug. 2014
Firstpage :
406
Lastpage :
411
Abstract :
Attacks against web servers and web-based applications remain a serious global network security threat. Attackers are able to compromise web services, collect confidential information from web data bases, interrupt or completely paralyze web servers. In this study, we consider the analysis of HTTP logs for the detection of network intrusions. First, a training set of HTTP requests which does not contain any attacks is analyzed. When all relevant information has been extracted from the logs, several clustering and anomaly detection algorithms are employed to describe the model of normal users behavior. This model is then used to detect network attacks as deviations from the norms in an online mode. The simulation results presented show that, compared to other data mining algorithms, the method results in a higher accuracy rate.
Keywords :
Web services; hypermedia; security of data; HTTP logs; HTTP request; Web attack; Web server; Web services; Web-based application; anomaly detection; clustering algorithm; global network security threat; network intrusion detection; Accuracy; Data mining; Entropy; Feature extraction; Training; Vectors; Web servers; anomaly detection; data mining; entropy; intrusion detection; n-gram;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable, Autonomic and Secure Computing (DASC), 2014 IEEE 12th International Conference on
Conference_Location :
Dalian
Print_ISBN :
978-1-4799-5078-2
Type :
conf
DOI :
10.1109/DASC.2014.79
Filename :
6945724
Link To Document :
بازگشت