DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/8439
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAgarwal, Vinti-
dc.date.accessioned2023-01-10T10:17:00Z-
dc.date.available2023-01-10T10:17:00Z-
dc.date.issued2019-
dc.identifier.urihttps://ieeexplore.ieee.org/abstract/document/9118146-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8439-
dc.description.abstractWeb applications are compromised by exploiting different vulnerabilities. The protection systems designed to detect such attacks, screen the HTTP requests to decide whether a particular request is benign or malicious. Generating effective screening rules governs the detection performance and false positive rate. In this paper, we propose to generate classification rules to identify malicious HTTP requests using co-occurrence between certain character combinations. Our idea is motivated by the fact that, a successful attack will have some combination of characters together. For e.g., in an SQL injection attack = sign may appear along with “'”. We propose to learn such character combinations using association rules with a set of carefully chosen feature (character) set. We experiment with a publicly available HTTP dataset and show that malicious HTTP requests can be identified with rules generated from such associations.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectComputer Scienceen_US
dc.subjectData Miningen_US
dc.subjectData protectionen_US
dc.subjectHypermediaen_US
dc.subjectInterneten_US
dc.subjectLearning (artificial intelligence)en_US
dc.subjectTransport protocolsen_US
dc.titleIdentifying Anomalous HTTP Traffic with Association Rule Miningen_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.