Please use this identifier to cite or link to this item:
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/8439
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Agarwal, Vinti | - |
dc.date.accessioned | 2023-01-10T10:17:00Z | - |
dc.date.available | 2023-01-10T10:17:00Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | https://ieeexplore.ieee.org/abstract/document/9118146 | - |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8439 | - |
dc.description.abstract | Web applications are compromised by exploiting different vulnerabilities. The protection systems designed to detect such attacks, screen the HTTP requests to decide whether a particular request is benign or malicious. Generating effective screening rules governs the detection performance and false positive rate. In this paper, we propose to generate classification rules to identify malicious HTTP requests using co-occurrence between certain character combinations. Our idea is motivated by the fact that, a successful attack will have some combination of characters together. For e.g., in an SQL injection attack = sign may appear along with “'”. We propose to learn such character combinations using association rules with a set of carefully chosen feature (character) set. We experiment with a publicly available HTTP dataset and show that malicious HTTP requests can be identified with rules generated from such associations. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Mining | en_US |
dc.subject | Data protection | en_US |
dc.subject | Hypermedia | en_US |
dc.subject | Internet | en_US |
dc.subject | Learning (artificial intelligence) | en_US |
dc.subject | Transport protocols | en_US |
dc.title | Identifying Anomalous HTTP Traffic with Association Rule Mining | en_US |
dc.type | Article | en_US |
Appears in Collections: | Department of Computer Science and Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.