DSpace Repository

Identifying Anomalous HTTP Traffic with Association Rule Mining

Show simple item record

dc.contributor.author Agarwal, Vinti
dc.date.accessioned 2023-01-10T10:17:00Z
dc.date.available 2023-01-10T10:17:00Z
dc.date.issued 2019
dc.identifier.uri https://ieeexplore.ieee.org/abstract/document/9118146
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8439
dc.description.abstract Web applications are compromised by exploiting different vulnerabilities. The protection systems designed to detect such attacks, screen the HTTP requests to decide whether a particular request is benign or malicious. Generating effective screening rules governs the detection performance and false positive rate. In this paper, we propose to generate classification rules to identify malicious HTTP requests using co-occurrence between certain character combinations. Our idea is motivated by the fact that, a successful attack will have some combination of characters together. For e.g., in an SQL injection attack = sign may appear along with “'”. We propose to learn such character combinations using association rules with a set of carefully chosen feature (character) set. We experiment with a publicly available HTTP dataset and show that malicious HTTP requests can be identified with rules generated from such associations. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.subject Computer Science en_US
dc.subject Data Mining en_US
dc.subject Data protection en_US
dc.subject Hypermedia en_US
dc.subject Internet en_US
dc.subject Learning (artificial intelligence) en_US
dc.subject Transport protocols en_US
dc.title Identifying Anomalous HTTP Traffic with Association Rule Mining en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account