DocumentCode :
3658698
Title :
Detecting Malicious Inputs of Web Application Parameters Using Character Class Sequences
Author :
Yang Zhong;Hiroshi Asakura;Hiroki Takakura;Yoshihito Oshima
Author_Institution :
NTT Secure Platform Labs., Musashino, Japan
Volume :
2
fYear :
2015
fDate :
7/1/2015 12:00:00 AM
Firstpage :
525
Lastpage :
532
Abstract :
Web attacks that exploit vulnerabilities of web applications are still major problems. The number of attacks that maliciously manipulate parameters of web applications such as SQL injections and command injections is increasing nowadays. Anomaly detection is effective for detecting these attacks, particularly in the case of unknown attacks. However, existing anomaly detection methods often raise false alarms with normal requests whose parameters differ slightly from those of learning data because they perform strict feature matching between characters appeared as parameter values and those of normal profiles. We propose a novel anomaly detection method using the abstract structure of parameter values as features of normal profiles in this paper. The results of experiments show that our approach reduced the false positive rate more than existing methods with a comparable detection rate.
Keywords :
"Servers","Feature extraction","Training","Accuracy","Training data","Electronic mail","Payloads"
Publisher :
ieee
Conference_Titel :
Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual
Electronic_ISBN :
0730-3157
Type :
conf
DOI :
10.1109/COMPSAC.2015.73
Filename :
7273662
Link To Document :
بازگشت