2017 10th International Symposium on Computational Intelligence and Design (ISCID) 2017
DOI: 10.1109/iscid.2017.223
|View full text |Cite
|
Sign up to set email alerts
|

An Anomaly Detection Method Based on Multi-models to Detect Web Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Combining different classification algorithms is common: Wang and Zhang [103] introduced Information Gain based attribute selection, and then K-NN and OCSVM were used to detect anomalies. Zhang, Lu and Xu [63] propose a multi-model approach: First, the web request is partitioned into 7 fields: method, web resource, HTTP version, headers and headers inputs values are inspected by a probability distribution model, attribute sequence is inspected by HMM and attribute value is inspected by OCSVM. If one of the algorithms detects the request as anomalous, it is classified as anomalous.…”
Section: Discussionmentioning
confidence: 99%
“…Combining different classification algorithms is common: Wang and Zhang [103] introduced Information Gain based attribute selection, and then K-NN and OCSVM were used to detect anomalies. Zhang, Lu and Xu [63] propose a multi-model approach: First, the web request is partitioned into 7 fields: method, web resource, HTTP version, headers and headers inputs values are inspected by a probability distribution model, attribute sequence is inspected by HMM and attribute value is inspected by OCSVM. If one of the algorithms detects the request as anomalous, it is classified as anomalous.…”
Section: Discussionmentioning
confidence: 99%
“…Each model trained on a dataset contains normal requests only and is evaluated by using two datasets: Wikipedia access traces [22] and FuzzDB [23]. Using a multimodel-based method takes advantage of all models in it, by this method, the authors mitigated false positive issue significantly [24].…”
Section: Related Workmentioning
confidence: 99%
“…The Long-short term memory model is generally used for anomaly detection and diagnosis in system logs [43]. Zhang et al [44] proposed a multi-model inspection of network request messages to identify attacks. Three machine learning models, such as probability distribution model, hidden Markov model and support vector machine model, are used to detect different fields of the network request message.…”
Section: Abnormal Network Traffic Detectionmentioning
confidence: 99%