【24h】

Access Log Anomaly Detection

机译:访问日志异常检测

获取原文

摘要

Maintaining network security is very important and tedious in today's world. Since web applications are not built on sound security methodology, they are the major target for the attackers. Analyzing access logs for detecting anomalous activities is a form of defense achieved in this paper. Anomaly detection is important because if the anomalies are not detected apriori, it may lead to hacking of the entire system. This paper is based on analyzing the stored access logs and detecting the anomalous events. Our experiment evaluates both static and dynamic logs. In dynamic implementation, the pattern matching approach is used to detect the anomalies from access logs. In Weka, the supervised neural network approach gives better anomaly prediction than unsupervised neural network approach for static logs. Maximum prediction accuracy is achieved in supervised neural networks by using Naive Bayes Multinomial Text Algorithm. Since the input attributes (logs) are strings, the use of Bayes classifier gives us a better accuracy rate while compared to other classifier algorithms. The proposed approach identifies the suspicious activities and serious anomalies that may be one of the way for the hackers to hack our system. Overall error rate of our supervised method is less than 10% and unsupervised method is approximately 30%.
机译:在当今世界,维护网络安全非常重要且繁琐。由于Web应用程序不是基于可靠的安全方法构建的,因此它们是攻击者的主要目标。分析访问日志以检测异常活动是本文实现的一种防御方式。异常检测非常重要,因为如果没有先验地检测到异常,则可能导致整个系统被黑客入侵。本文基于分析存储的访问日志并检测异常事件。我们的实验评估静态和动态日志。在动态实现中,模式匹配方法用于从访问日志中检测异常。在Weka中,对于静态日志,有监督的神经网络方法比无监督的神经网络方法提供了更好的异常预测。通过使用朴素贝叶斯多项式文本算法,在监督神经网络中可以实现最大的预测精度。由于输入属性(日志)是字符串,因此与其他分类器算法相比,贝叶斯分类器的使用为我们提供了更高的准确率。提议的方法可以识别可疑活动和严重异常,这可能是黑客入侵我们的系统的方式之一。我们的监督方法的总体错误率小于10%,非监督方法的总体错误率约为30%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号