Abstract
Open Web Applications Security Project (OWASP), an open-source community committed to serve application developers and security professionals has always accentuated on the dire consequences of web application vulnerabilities like SQLI, XSS, LDAP, and Buffer overflow attacks frequently occurring on the web application threat landscape. Since these attacks are difficult to comprehend, machine learning algorithms are often applied to this problem context for decoding anomalous patterns. This work explores the performance of algorithms like decision forest, neural networks, support vector machine, and logistic regression. Their performance has been evaluated using standard performance metrics. HTTP CSIC 2010, a web intrusion detection dataset is used in this study. Experimental results indicate that SVM and LR have been superior in their performance than their counterparts. Predictive workflows have been created using Microsoft Azure Machine Learning Studio (MAMLS), a scalable machine learning platform which facilitates an integrated development environment to data scientists.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
N. Keegan et al., A survey of cloud-based network intrusion detection analysis. Human-centric Comput. Inf. Sci. 6(1), 19 (2016)
S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing. J. Network Comput. Appl. 34(1), 1–11 (2011)
C.-F. Tsai et al., Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994–12000 (2009)
K. Koitzsch, Standard toolkits for hadoop and analytics (Pro Hadoop Data Analytics. Apress, Berkeley, CA, 2017), pp. 43–62
V. Bolon-Canedo, N. Sanchez-Marono, A. Alonso-Betanzos, Feature selection and classification in multiple class datasets: an application to KDD Cup 99 dataset. Expert Syst. Appl. 38(5), 5947–5957 (2011)
A.S. Eesa, Z. Orman, A.M.A. Brifcani, A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Syst. Appl. 42(5):2670–2679 (2015)
C. Torrano-Gimenez, A. Perez-Villegas, G. Alvarez Maranon. HTTP data set CSIC 2010 (2010)
H. Xu, C. Caramanis, S. Mannor, Sparse algorithms are not stable: a no-free-lunch theorem. IEEE Trans. Pattern Anal. Mach. Intell. 34(1), 187–193 (2012)
Y.-C. Ho, D.L. Pepyne, Simple explanation of the no-free-lunch theorem and its implications. J. Optim. Theory Appl. 115(3), 549–570 (2002)
S. Mund, Microsoft Azure Machine Learning (Packt Publishing Ltd, 2015)
Positive Technologies detected vulnerabilities in a popular network control software https://www.ptsecurity.com/upload/corporate/ww-en/analytics/WebApp-Attacks-2017-eng.pdf
Imperva Web Application Attack Report, https://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed6.pdf
Acunetix, Defence in depth and how it applies to web applications, http://www.infosecurityeurope.com/__novadocuments/237693?v
CISCO, Understanding SQL Injection, https://www.cisco.com/c/en/us/about/security-center/sql-injection.html
DB Networks, Stop SQL Injection Now! http://www.dbnetworks.com/pdf/ponemon-the-SQL-injection-threat-study.pdf
R. Kozik et al., A Proposal of algorithm for web applications cyber attack detection, in IFIP International Conference on Computer Information Systems and Industrial Management (Springer, Berlin, Heidelberg, 2014)
H. Nguyen et al., Application of the generic feature selection measure in detection of web attacks in Computational Intelligence in Security for Information Systems (Springer, Berlin, Heidelberg, 2011), pp. 25–32
E. Han, Analyzing and classifying web application attacks. Int. J. Adv. Electron. Comput. Sci. 2(4) (2015)
Z. Zhang, R. George, K. Shujaee, Efficient detection of anomalous HTTP payloads in networks, in SoutheastCon, 2016. IEEE (2016)
D. Atienza, Á. Herrero, E. Corchado, Neural analysis of http traffic for web attack detection, in International Joint Conference (Springer, Cham, 2015)
C.T. Gimenez, A.P. Villegas, G. A. Maranon, HTTP data set CSIC 2010 (2010)
R. Barga et al., Predictive Analytics with Microsoft Azure Machine Learning (Apress, 2015)
F. Amiri et al., Mutual information-based feature selection for intrusion detection systems. J. Network Comput. Appl. 34(4), 1184–1199 (2011)
F. Pedregosa et al., Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12(Oct), 2825–2830 (2011)
S.B. Kotsiantis, I. Zaharakis, P. Pintelas, Supervised machine learning: a review of classification techniques. Emerg. Artif. Intell. Appl. Comput. Eng. 160, 3–24 (2007)
R. Herbrich, T. Graepel, C. Campbell, Bayes point machines. J. Mach. Learn. Res. 1(Aug):245–279 (2001)
S. Haykin, N. Network, A comprehensive foundation. Neural Networks 2(2004), 41 (2004)
J. Shotton et al., Decision jungles: compact and rich models for classification. Adv. Neural Inf. Process. Syst (2013)
L. Rokach, Ensemble-based classifiers. Artif. Intell. Rev. 33(1–2), 1–39 (2010)
I. Syarif et al., Application of bagging, boosting and stacking to intrusion detection, in International Workshop on Machine Learning and Data Mining in Pattern Recognition (Springer, Berlin, Heidelberg, 2012)
B. Wang, N.Z. Gong. Stealing hyperparameters in machine learning. arXiv preprint arXiv: 1802.05351 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Smitha, R., Hareesha, K., Kundapur, P.P. (2019). A Machine Learning Approach for Web Intrusion Detection: MAMLS Perspective. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 900. Springer, Singapore. https://doi.org/10.1007/978-981-13-3600-3_12
Download citation
DOI: https://doi.org/10.1007/978-981-13-3600-3_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3599-0
Online ISBN: 978-981-13-3600-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)