• DocumentCode
    3658698
  • Title

    Detecting Malicious Inputs of Web Application Parameters Using Character Class Sequences

  • Author

    Yang Zhong;Hiroshi Asakura;Hiroki Takakura;Yoshihito Oshima

  • Author_Institution
    NTT Secure Platform Labs., Musashino, Japan
  • Volume
    2
  • fYear
    2015
  • fDate
    7/1/2015 12:00:00 AM
  • Firstpage
    525
  • Lastpage
    532
  • Abstract
    Web attacks that exploit vulnerabilities of web applications are still major problems. The number of attacks that maliciously manipulate parameters of web applications such as SQL injections and command injections is increasing nowadays. Anomaly detection is effective for detecting these attacks, particularly in the case of unknown attacks. However, existing anomaly detection methods often raise false alarms with normal requests whose parameters differ slightly from those of learning data because they perform strict feature matching between characters appeared as parameter values and those of normal profiles. We propose a novel anomaly detection method using the abstract structure of parameter values as features of normal profiles in this paper. The results of experiments show that our approach reduced the false positive rate more than existing methods with a comparable detection rate.
  • Keywords
    "Servers","Feature extraction","Training","Accuracy","Training data","Electronic mail","Payloads"
  • Publisher
    ieee
  • Conference_Titel
    Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual
  • Electronic_ISBN
    0730-3157
  • Type

    conf

  • DOI
    10.1109/COMPSAC.2015.73
  • Filename
    7273662