2020 International Conference on Cyber Warfare and Security (ICCWS) 2020
DOI: 10.1109/iccws48432.2020.9292393
|View full text |Cite
|
Sign up to set email alerts
|

Web Server Attack Detection using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Amankwah R, Chen J, Kudjo P, and Towey D [17] used WebGoat and DVWA to conduct experiments in evaluating the performance of vulnerability scanning applications, both open-source and commercial applications. Saleem S, Sheeraz M, Hanif M, and Farooq U [18] made a model with machine learning to detect attacks on web servers. In classifying the model, the dataset used is a server access log file consisting of normal access logs, SQL injection attack logs, XSS attack logs, and Denial of Service (DOS) attack logs against DVWA applications.…”
Section: Related Workmentioning
confidence: 99%
“…Amankwah R, Chen J, Kudjo P, and Towey D [17] used WebGoat and DVWA to conduct experiments in evaluating the performance of vulnerability scanning applications, both open-source and commercial applications. Saleem S, Sheeraz M, Hanif M, and Farooq U [18] made a model with machine learning to detect attacks on web servers. In classifying the model, the dataset used is a server access log file consisting of normal access logs, SQL injection attack logs, XSS attack logs, and Denial of Service (DOS) attack logs against DVWA applications.…”
Section: Related Workmentioning
confidence: 99%
“…Traditional rule-based approaches have many challenges, including the difficulty of creating rules that can detect unforeseen error conditions and the effort required to manually maintain rule sets. Advances in deep learning and anomaly detection methodologies show potential for practical use against many forms of log detection targets, including failures [1], security/network intrusions [2] [3] [4], and performance degradation indicators [5] [6]. These methods have the potential to improve upon the weaknesses of rule-based approaches in that they don't require manual rule creation or maintenance.…”
Section: Introductionmentioning
confidence: 99%
“…Log analysis can also be used for real-time detection of streaming attack behaviors, enabling timely attack discovery. Overall, server logs provide valuable data for detecting and preventing attacks on web applications [18].…”
Section: Introductionmentioning
confidence: 99%