2006
DOI: 10.1007/978-0-387-34749-3_34
|View full text |Cite
|
Sign up to set email alerts
|

Web Attack Detection Using ID3

Abstract: Abstract. Decision tree learning algorithms have been successfully used in knowledge discovery. They use induction in order to provide an appropriate classification of objects in terms of their attributes, inferring decision tree rules. This paper reports on the use of ID3 to Web attack detection. Even though simple, ID3 is sufficient to put apart a number of Web attacks, including a large proportion of their variants. It also surpasses existing methods: it portrays a higher true-positive detection rate and a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…Different strategies have been presented as a solution to the problem of SQL injection attacks [1], with special attention given to strategies based on IDSs [2], [3], [4], [5], [6], [7], [8], [9]. One approach based on anomaly detection was proposed by [2], applying a clustering strategy to group similar queries and isolate queries which are considered malicious.…”
Section: Sql Injection Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Different strategies have been presented as a solution to the problem of SQL injection attacks [1], with special attention given to strategies based on IDSs [2], [3], [4], [5], [6], [7], [8], [9]. One approach based on anomaly detection was proposed by [2], applying a clustering strategy to group similar queries and isolate queries which are considered malicious.…”
Section: Sql Injection Attacksmentioning
confidence: 99%
“…However, it is susceptible to generating false positives. The algorithm ID3, presented by Garcia, Monroy and Quintana [8], proposes the detection of attacks targeted at web applications. The algorithm ID3 is used to detect and filter malicious SQL strings, presenting a significant percentage of incorrect classifications.…”
Section: Sql Injection Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Different strategies have been presented as a solution to the problem of SQL injection attacks [1], with special attention given to strategies based on IDSs [2], [3], [4], [5], [6], [7], [8]. One approach based on anomaly detection was proposed by [2], applying a clustering strategy to group similar queries and isolate queries which are considered malicious.…”
Section: Sql Injection Attacksmentioning
confidence: 99%
“…In spite of it being a well-known type of attack, the SQL injection remains at the top of the published threat list. The solutions proposed so far [2], [3], [4], [5], [6], [7], [8] seem insufficient to prevent and block this type of attack because these solutions lack the learning and adaptation capabilities for dealing with attacks and their possible variations in the future. In addition, the vast majority of solutions are based on centralized mechanisms with little capacity to work in distributed and dynamic environments.…”
Section: Introductionmentioning
confidence: 99%