计算机科学
恒虚警率
异常检测
数据挖掘
方案(数学)
离群值
Web应用程序
混合模型
特征(语言学)
机器学习
人工智能
万维网
数学
语言学
数学分析
哲学
作者
Nour Moustafa,Gaurav Misra,Jill Slay
出处
期刊:IEEE transactions on sustainable computing
[Institute of Electrical and Electronics Engineers]
日期:2021-04-01
卷期号:6 (2): 245-256
被引量:19
标识
DOI:10.1109/tsusc.2018.2808430
摘要
Web application attacks constitute considerable security threats to computer networks and end users. Existing threat detection methods are mostly designed on signature-based approaches which cannot recognize zero-day vulnerabilities. Moreover, with the minimal availability of real-world web attack data, the effectiveness of such approaches is limited further. In this paper, we propose an architectural scheme for designing a threat intelligence technique for web attacks to address these challenges through a four-step methodology: 1) collecting web attack data by crawling websites and accumulating network traffic for representing this data as feature vectors; 2) dynamically extracting important features using the Association Rule Mining (ARM) algorithm; 3 ) using these extracted features to simulate web attack data; and 4) proposing a new Outlier Gaussian Mixture (OGM) technique for detecting known as well as zero-day attacks based on the anomaly detection methodology. The performance of the scheme is appraised using two well-known datasets, namely, the Web Attack and UNSW-NB15 datasets. The empirical evaluations demonstrate that the proposed scheme outperforms four other competing machine learning mechanisms in terms of detection rate and false alarm rates on both the original as well as simulated web data.
科研通智能强力驱动
Strongly Powered by AbleSci AI