Literature Survey on Detection of Web Attacks Using Machine Learning

Authors

  • Abhishek Gupta  Student, CSE, Bharati Vidyapeeth's College of Engineering, New Delhi, India
  • Ankit Jain  Student, CSE, Bharati Vidyapeeth's College of Engineering, New Delhi, India
  • Samartha Yadav  Student, CSE, Bharati Vidyapeeth's College of Engineering, New Delhi, India
  • Harsh Taneja  Assistant Professor, Bharati Vidyapeeth's College of Engineering, New Delhi, India

Keywords:

Machine Learning, Web Attacks, Classification, Support Vector Machines, Clustering

Abstract

With the increase in reliability on web applications for day to day activities There has been an immense growth in number of web applications that are being created and used world-wide. But this elevation of web applications has led to the increase in the exploitation of vulnerabilities in web apps that has further lead to web attacks. The industry has suffered due to these rising web attacks. Yet the evolution of information technology and the advent of machine learning has eased web attacks’ detection. The detection of these web attacks relies upon the patterns obtained via Machine Learning algorithms which further aids in deciding whether the web attack has been caused or not. This paper comprises techniques that are Classification, Support Vector Machine and Clustering with respect to web attacks and their detection.

References

  1. B. D. Priyaa and M. I. Devi, "Hybrid SQL injection detection system," 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 2016
  2. Yun-lei Cai, Duo Ji ,Dong-feng Cai, “A KNN Research Paper Classification MethodBased on Shared Nearest Neighbor”, Proceedings of NTCIR-8 Workshop Meeting, June 15–18, 2010, Tokyo, Japan
  3. Ml-knn: “A Lazy Learning Approach to Multi-Label Learning”, Min-Ling Zhang, Zhi-Hua Zhou,Pattern Recognition, Volume 40, Issue 7, July 2007, Pages 2038-2048
  4. Neha Patel, Divakar Singh,”An Algorithm to Construct Decision Tree for Machine Learning based on Similarity Factor”,International Journal of Computer Applications (0975 – 8887) Volume 111 – No 10, February 2015
  5. J. Ren, S. D. Lee, X. Chen, B. Kao, R. Cheng and D. Cheung, "Naive Bayes Classification of Uncertain Data," 2009 Ninth IEEE International Conference on Data Mining, Miami, FL, 2009
  6. S. Zhang, B. Li, J. Li, M. Zhang and Y. Chen, "A Novel Anomaly Detection Approach for Mitigating Web-Based Attacks Against Clouds," Cyber Security sand Cloud Computing (CSCloud), 2015 IEEE 2nd International Conference, New York, NY, 2015
  7. J. Yan, X. Yun, P. Zhang, J. Tan and L. Guo, "A New Weighted Ensemble Model for Detecting DoS Attack Streams," Intelligence and Intelligent Agent Technology (WI-IAT), 2010 IEEE/WIC/ACM International Conference on, Toronto, ON, 2010
  8. Romil Rawat,Shailendra Kumar Shrivastav, “SQL injection attack Detection using SVM”, International Journal of Computer Applications (0975 – 8887)Volume 42– No.13, March 2012
  9. S. Mukkamala, G. Janoski and A. Sung, "Intrusion detection using neural networks and support vector machines," Neural Networks, 2002. IJCNN '02. Proceedings of the 2002 International Joint Conference on, Honolulu, HI, 2002
  10. Shailendra Singh and Sanjay Silakari , “Cyber Attack Detection System based on Improved SupportVector Machine”, International Journal of Security and Its ApplicationsVol.9, No.9 (2015), pp.371-386
  11. Ungtaek Seo , Cheolho Lee , Taeshik Shon , KyuHyung Cho ,and Jongsub MoonA, “New DDoS Detection Model Using Multiple SVMs and TRA”, T. Enokido et al. (Eds.): EUC Workshops 2005, LNCS 3823, pp. 976 – 985, 2005. © IFIP International Federation for Information Processing 2005
  12. Katherine A. Heller,Krysta M. Svore, Angelos D. Keromytis,Salvatore J. Stolfo. , “One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses”, Proc. of the workshop on Data Mining for Computer Security. Vol. 9. 2003.
  13. Liu Zhigang, Shi Wenzhong, Qin Qianqing, Li Xiaowen and Xie Donghui, "Hierarchical support vector machines," Proceedings. 2005 IEEEInternational Geoscience and Remote Sensing Symposium, 2005. IGARSS '05., 2005, pp. 4 pp.
  14. J. A. Jahanshahi and M. Eslami, "On the performance of SVM based jamming attacks detection algorithm in base station," Communication Technologies Workshop (Swe - CTW),2011 IEEE Swedish, Stockholm, 2011, pp. 109- 113.
  15. Y. Chen, X. Chen, H. Tian, T. Wang and Y. Cai, "A blind detection method for tracing the real source of DDo S attack packets by cluster matching," 2016 8th IEEE International Conference on Communication Software and Networks(ICCSN), Beijing, China, 2016, pp. 551-555.
  16. R. Patil, B. Dasharath Dhamdhere, K. S. Dhonde, R. G. Chinchwade and S. B. Mehetre, "A hybrid model to detect phishing-sites using clustering and Bayesian approach," Convergence of Technology (I2CT), 2014 International Conference, Pune, 2014, pp. 1-5
  17. S. Nath, N. Marchang and A. Taggu, "Mitigating SSDF attack using k-medoids clustering in Cognitive Radio Networks," Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference , Abu Dhabi, 2015, pp. 275-282.
  18. F. Guorui, Z. Xinguo and W. Jian, "Intrusion detection based on the semi-supervised Fuzzy C-Means clustering algorithm," Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on – , Yichang, 2012, pp. 2667- 2670.
  19. I. Kiss, B. Genge and P. Haller, "A clustering-based approach to detect cyber-attacks in process control systems," 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), Cambridge, 2015, pp. 142-148.
  20. M. A. Jan, P. Nanda, X. He and R. P. Liu, "A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network," Trustcom/BigDataSE/ISPA, 2015 IEEE, Helsinki, 2015, pp. 318-325.
  21. Z. Zhang and S. R. Kulkarni, "Detection of shilling attacks in recommender systems via spectral clustering," Information Fusion (FUSION), 2014 17th International Conference on – , Salamanca, 2014, pp. 1-8.
  22. X. Qin, T. Xu and C. Wang, "DDoS Attack Detection Using Flow Entropy and Clustering Technique," 201511th International Conference on Computational Intelligence and Security (CIS), Shenzhen, 2015, pp. 412-415.
  23. M. A. Jan, P. Nanda, X. He and R. P. Liu, "A Sybil Attack Detection Scheme for a Centralized ClusteringBased Hierarchical Network," Trustcom/BigDataSE/ISPA, 2015 IEEE, Helsinki, 2015, pp. 318-325.
  24. R. C. Patil and D. R. Patil, "Web spam detection using SVM classifier," Intelligent Systems and Control (ISCO), 2015 IEEE 9th International Conference on – , Coimbatore, 2015
  25. P. J. Koyande and K. P. Shirsat, "T - vigilant: To unmask radical attacks and halt the innocents," 2015 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, 2015

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Abhishek Gupta, Ankit Jain, Samartha Yadav, Harsh Taneja, " Literature Survey on Detection of Web Attacks Using Machine Learning , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1845-1853, March-April-2018.