【24h】

Data Mining Methods for Anomaly Detection of HTTP Request Exploitations

机译:HTTP请求利用异常检测的数据挖掘方法

获取原文
获取原文并翻译 | 示例

摘要

HTTP request exploitations take substantial portion of network-based attacks. This paper presents a novel anomaly detection framework, which uses data mining technologies to build four independent detection models. In the training phase, these models mine specialty of every web program using web server log files as data source, and in the detection phase, each model takes the HTTP requests upon detection as input and calculates at least one anomalous probability as output. All the four models totally generate eight anomalous probabilities, which are weighted and summed up to produce a final probability, and this probability is used to decide whether the request is malicious or not. Experiments prove that our detection framework achieves close to perfect detection rate under very few false positives.
机译:HTTP请求利用占据了基于网络的攻击的很大一部分。本文提出了一种新颖的异常检测框架,该框架使用数据挖掘技术来构建四个独立的检测模型。在训练阶段,这些模型使用Web服务器日志文件作为数据源来挖掘每个Web程序的特长,在检测阶段,每个模型都将检测到的HTTP请求作为输入,并计算至少一个异常概率作为输出。所有这四个模型总共产生八个异常概率,将其加权并求和以产生最终概率,该概率用于确定请求是否恶意。实验证明,在极少的误报情况下,我们的检测框架可达到接近完美的检测率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号