WebAD$$^{}$$: A Cascading Model Based on Machine Learning for Web Attacks Detection

springer

引用 0|浏览0
暂无评分
摘要
Anomalies in network are complicated and fast-changing, which pose serious threats to network security. In an intrusion detection system (IDS), achieving high detection rate and low false alarm rate is an essential requirement. Furthermore, faced with the explosive growth of network data, rapid recognition counts for as much as accuracy. In this paper, we propose a two-stage cascading model, named WebAD\(^{2}\), for detecting web attacks. WebAD\(^{2}\) applies machine learning techniques to detect anomalous behaviors. However, unlike traditional approaches, WebAD\(^{2}\) divided machine learning process into two stages. In the first stage, partial but key features are selected for training and detecting to accelerate the detection speed. The intermediate results are passed to the second stage and all features are applied to refine the detection results, therefore improve the accuracy of the model. We conduct comprehensive experiments to evaluate the effectiveness and efficiency of WebAD\(^{2}\). The results show that WebAD\(^{2}\) could significantly improve the model efficiency without sacrificing the detection accuracy. The processing speed is reduced up to more than 70% on average, with an accuracy decrease less than 1%. What’s more, the performance results on NSL-KDD also verify that WebAD\(^{2}\) could be universal to detect network flow traffics.
更多
查看译文
关键词
Web attack,Anomaly detection,Machine learning,Cascading model,URI analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要