Dynamic web services are vulnerable to multitude of intrusions that could be previously unknown. Server logs contain vast amounts of information about network traffic, and finding attacks from these logs improves the security of the services. In this research features are extracted from HTTP query parameters using 2-grams. We propose a framework that uses dimensionality reduction and clustering to identify anomalous behavior. The framework detects intrusions from log data gathered from a real network service. This approach is adaptive, works on the application layer and reduces the number of log lines that needs to be inspected. Furthermore, the traffic can be visualized.peerReviewe
In recent times complex software systems are continuously generating application and server logs for...
Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort ...
peer reviewedDealing with large volumes of logs is like the prover- bial needle in the haystack pro...
Dynamic web services are vulnerable to multitude of intrusions that could be previously unknown. Ser...
Information security has become a very important topic especially during the last years. Web service...
The goal of this study is to detect anomalous queries from network logs using a dimensionality reduc...
Part 9: Machine LearningInternational audienceThe goal of this study is to detect anomalous queries ...
Network traffic is increasing all the time and network services are becoming more complex and vulne...
Cyber threats are a severed challenge in current communications networks. Several security measures ...
Huge datasets in cyber security, such as network traffic logs, can be analyzed using machine learnin...
International audienceOffering a secured shared hosting environment for web applications is not a tr...
Despite several years of intensive study, intrusion detection systems still suffer from a key defici...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
Cybercriminals exploit vulnerabilities in web applications by leveraging different attacks to gain u...
As information systems become increasingly complex and pervasive, they become inextricably intertwin...
In recent times complex software systems are continuously generating application and server logs for...
Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort ...
peer reviewedDealing with large volumes of logs is like the prover- bial needle in the haystack pro...
Dynamic web services are vulnerable to multitude of intrusions that could be previously unknown. Ser...
Information security has become a very important topic especially during the last years. Web service...
The goal of this study is to detect anomalous queries from network logs using a dimensionality reduc...
Part 9: Machine LearningInternational audienceThe goal of this study is to detect anomalous queries ...
Network traffic is increasing all the time and network services are becoming more complex and vulne...
Cyber threats are a severed challenge in current communications networks. Several security measures ...
Huge datasets in cyber security, such as network traffic logs, can be analyzed using machine learnin...
International audienceOffering a secured shared hosting environment for web applications is not a tr...
Despite several years of intensive study, intrusion detection systems still suffer from a key defici...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
Cybercriminals exploit vulnerabilities in web applications by leveraging different attacks to gain u...
As information systems become increasingly complex and pervasive, they become inextricably intertwin...
In recent times complex software systems are continuously generating application and server logs for...
Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort ...
peer reviewedDealing with large volumes of logs is like the prover- bial needle in the haystack pro...