Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 362-364.

Previous Articles     Next Articles

Web Attack Detection Method Based on Support Vector Machines

WU Shao-hua, CHENG Shu-bao and HU Yong   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Web attack detection is a kind of dynamic Web security protection technology,but the intruder can use diffe-rent coding schemes,mixed case,alternative statements and other skills,bypassing defense mechanism.For the particularity of web security and the shortage of the existing detection technology,we took SQL injection and cross site scripting attacks as an example.Firstly,the thesis studies the feature selection and extraction of SQL injection and cross site scripting attacks,and uses the artificial selection and mathematical statistical methods to covert the original payload into fixed dimension feature vector.Secondly,it marks the sample data after feature selection and extraction,and performs support vector machine training and classification.Finally,using the Weka,it verifies the feasibility and effectiveness of the approach.The experimental results show that features after selection and extraction can reflect the nature of the original data and this method has higher detection rate.

Key words: SQL injection,Cross site scripting,Web attack detection,Feature selection and extraction,Support vector machine

[1] Adeva J J G,Atxa J M P.Intrusion detection in web application using text mining[J].Engineering Applications of Artificial Intelligence,2007,0(4):555-566
[2] Almgren M,Debar H,Dacier M.A lightweight tool for detecting Web server attacks[C]∥Proceedings of Network and Distributed Systems Security.2000:157-170
[3] Almgren M,Lindqvist U.Application-integrated data collection for security monitoring[C]∥RAID 2001,LNCS 2212.Berlin:Springer-Verlag,s2001:22-36
[4] Garcia V H,Monroy R,Quintana M.Web attack detection using ID3.http://homepage.cem.itesm.mx/raulm/pub/id3-ids,2013-12
[5] 温凯,郭帆,余敏.自适应的Web攻击异常检测方法[J].计算机应用,2012,32(7):2003-2006,2014
[6] 张伟,吴灏,邹郢路.针对基于编码的跨站脚本攻击分析及防范方法[J].小型微型计算机系统,2013,34(7):1615-1619
[7] 杨晓峰,孙明明,胡雪蕾.一种基于DFA 的网络攻击检测算法[J].计算机工程,2010,36(13):149-150,153
[8] 孙义,胡雨霁,黄皓.基于序列比对的SQL 注入攻击检测方法[J].计算机应用研究,2010,27(9):3525-3528
[9] 曾金全,赵辉,刘才铭,等.受免疫原理启发的Web攻击检测方法[J].电子科技大学学报,2007,36(6):1215-1218
[10] 张博锋.面向内容安全的文本分类研究[D].长沙:国防科学技术大学,2007
[11] Joachims T.Text categorization with support vector machines:learning with many relevant features[C]∥10th European Conference on Machine Learning.1998:137-142
[12] 张晓惠,林柏钢.基于特征选择和多分类支持向量机的异常检测[J].通信学报,2009,0(10A):68-73
[13] XSSED.http://xssed.com,2014.1
[14] XSS(Cross Site Scripting) Cheat Sheet[EB/OL].http://ha.ckers.org/xssAttacks.xml.2014.1
[15] exploit-db[EB/OL].http://www.exploit-db.com/webapps,2014.1
[16] 程书宝.基于支持向量机的Web攻击检测技术[D].成都:四川大学,2014
[17] 甘俊英,张有为.一种基于奇异值特征的神经网络人脸识别新途径[J].电子学报,2004,32(1):170-173
[18] (美)Han Jia-wei,Kamber M.数据挖掘概念与技术(第3版)[M].范明,孟小峰,译.北京:机械工业出版社,2012
[19] 杨挚诚.基于机器学习的文本分类算法研究[D].桂林:广西大学,2007

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!