期刊文献+

一种基于Web日志的混合入侵检测方法 被引量:3

A Hybrid Intrusion Detection Method based on Web Log
下载PDF
导出
摘要 随着Web应用的快速发展,Web程序受到越来越多的攻击,而传统的Web程序的误用检测和异常检测分别有着漏报率和误报率高的特点,提出了一种基于Web日志的混合入侵检测方法,首先在OWASP Top10官方平台上获取误用检测的攻击特征向量并在漏洞平台WebGoat上进行已知的漏洞测试,构建误用检测的规则库,然后使用K-Means算法训练正常的Web日志构建用户的正常访问模型,最后在Web日志数据集上对Web混合入侵检测进行测试,实验表明该入侵检测模型能够提高检测率和降低误报率。 With the rapid development of web applications,web programs are attacked frequently.The traditional misuse detection and anomaly detection have the characteristics of high rate of missing report and false alarm rate respectively.A hybrid intrusion detection method based on Web log is proposed.Firstly,the attack feature vector of misuse detection is obtained on the official platform of OWASP TOP10,and the known vulnerability test is carried out on the vulnerability platform WebGoat to build the rule base of misuse detection.Then,the K-means algorithm is used to train the normal Web log to build the normal access model of users.Finally,the Web hybrid intrusion detection is tested on the web log data set.Experiments show that the intrusion detection model can improve the detection efficiency and reduce the false alarm rate.
作者 李钊 张先荣 郭帆 Li Zhao;Zhang Xianrong;Guo Fan(Department of Information Technology,Library,Anhui Medical University,Hefei,Anhui 340100,China;Institute of Advanced Cyberspace Technology,Guangzhou University,Guangzhou,Guangdong 510000,China;School of Computer and Information Engineering,Jiangxi Normal University,Nanchang,Jiangxi 330022,China)
出处 《黑龙江工业学院学报(综合版)》 2022年第7期47-52,共6页 Journal of Heilongjiang University of Technology(Comprehensive Edition)
关键词 WEB日志 误用检测 异常检测 Web混合入侵检测 检测率 Web log misuse detection anomaly detection Web hybrid intrusion detection detection rate
  • 相关文献

参考文献2

二级参考文献41

  • 1CRAIG L. Botnets, DDoS and Ground Truth A Look at 5000 Operator Confirmed Attacks [R]. NANOG50, Oct. 2010, Atlanta, Georgia, USA.
  • 2JUNG J, KRISHNAMURTHY B, RABINOVlCH M. Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites[C]. Proc. IEEE WWW, pp. 252-262, May 2002, Honolulu, Hawaii, USA.
  • 3XIE Yi, YU Shunzheng. Monitoring the applica- tion-layer DDoS attacks for popular websites [J] IEEE/ACM Trans. On Networks, 2009, vol. 17(1), DO. 15-25.
  • 4RAN JAN S, SWAMINATHAN R, et al. DDoS-Re- silient scheduling to counter application layer attacks under imperfect detecting [J]. IEEE/ACM Trans. On Networks, 2009, vol. 17(1), pp. 26-39.
  • 5OIKONOMOU G, MIRKOVIC J. Modeling hu- man behavior for defense against flash-crowd attacks [C]. Proc. IEEE ICC, 2009, Dresden, Ger- man, pp. 1-7.
  • 6XIE YI, YU Shunzheng. A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors [J]. IEEE/ACM Trans on Networks, 2009, vol. 17(1), pp. 54-65.
  • 7WANG Jin, YANG Xiaolong, LONG Keping. Web DDoS Detection Schemes Based on Measuring User's Access Behavior with Large Deviation [C]. Proc. IEEE Globecom, Dec. 2011, Houston, TX, USA. pp: 1-5.
  • 8STEVANOVlC D, AN A., VLAJIC N. Detection of Malicious and Non-malicious Website Visitors Using Unsupervised Neural Network Learning [J]. Elsevier Applied Soft Computing, January 2013, Vol. 13(1), pp: 698-708.
  • 9LEE et al. Sequence-order-independent network profiling for detecting application layer DDoS attacks [J]. EURASIP Journal on Wireless Com- munications and Networking 2011 2011:50.
  • 10YATAGAI T, ISOHARA T, SASASE I. Detection of HTTP-GET flood attack based on analysis of page access behavior [C], in Proceedings IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing, 2007, Victo- ria, BC, pp: 232-235.

共引文献8

同被引文献34

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部