Abstract
HTTP request exploitations take substantial portion of network-based attacks. This paper presents a novel anomaly detection framework, which uses data mining technologies to build four independent detection models. In the training phase, these models mine specialty of every web program using web server log files as data source, and in the detection phase, each model takes the HTTP requests upon detection as input and calculates at least one anomalous probability as output. All the four models totally generate eight anomalous probabilities, which are weighted and summed up to produce a final probability, and this probability is used to decide whether the request is malicious or not. Experiments prove that our detection framework achieves close to perfect detection rate under very few false positives.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kruegel, C.: Anomaly Detection of Web-based Attacks. In: CCS 2003, Washington, DC, USA, October 27–31 (2003)
Billingsley, P.: Probability and Measure,3 edn., April 1995. Wiley Interscience, Hoboken (1995)
Mitchell, T.: Machine Learning. McGraw Hill, New York (1997)
CGISecurity. The Cross Site Scripting FAQ
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, XF., Zhou, JL., Yu, SS., Cai, LZ. (2005). Data Mining Methods for Anomaly Detection of HTTP Request Exploitations. In: Wang, L., Jin, Y. (eds) Fuzzy Systems and Knowledge Discovery. FSKD 2005. Lecture Notes in Computer Science(), vol 3614. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11540007_39
Download citation
DOI: https://doi.org/10.1007/11540007_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28331-7
Online ISBN: 978-3-540-31828-6
eBook Packages: Computer ScienceComputer Science (R0)