Applying Feature Selection To Payload-Based Web Application Firewalls

PROCEEDINGS OF THE 2011 3RD INTERNATIONAL WORKSHOP ON SECURITY AND COMMUNICATION NETWORKS (IWSCN 2011)(2011)

引用 20|浏览11
暂无评分
摘要
Web Application Firewalls (WAFs) analyze the HTTP traffic in order to protect Web applications from attacks. To be effective, WAFs need to analyze the payload of the packets. One of the techniques used for intrusion detection is to extract features from the payload by means of n-grams. An n-gram is a subsequence of n items from a given sequence. The number of n-grams is 256 to the nth power. Since it grows exponentially with n, the curse of dimensionality and computational complexity problem arise. In this paper we propose to apply feature selection in order to reduce the number of features extracted by n-grams and thus to improve the effectiveness of WAFs. We conduct experiments on our own HTTP data set. After extracting n-grams from this data set, we apply the Generic-Feature-Selection (GeFS) measure for intrusion detection [5] to select important features. We use four different classifiers to test the detection accuracy before and after feature selection. The experiments show that we can remove more than 95% of irrelevant and redundant features from the original data set (and thus improve the performance by more than 80% on average), while reducing only slighlty (by less than 6%) the accuracy of WAFs.
更多
查看译文
关键词
Web attack detection,Web application firewall,intrusion detection systems,n-grams,feature selection,machine learning algorithms
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要