Abstract
With the increased attacks of web servers and web applications, it is urgent to develop a system to detect web intrusions. Web log files are stream data recording users’ clicks behavior during surfing the Internet. By carefully analyzing these log files, we can reveal some potential anomalies or attacks so as to reduce the loss of property. A method, that applies neural network method to web intrusion detection based on web server access logs, is proposed in this paper. Before feeding the raw log files into neural network algorithms, we need to preprocess these text files and make sure processed logs are of good quality with less noisy and errors. At the result part, our evaluations also demonstrate that the proposed method is superior to decision tree classifier, which shows neural network method can be transplant to web intrusion detection effectively.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Comput. Netw. 48(5), 717–738 (2005)
Meyer, R., Cid, C.: Detecting attacks on web applications from log files. Sans Institute (2008)
Patil, P.V., Patil, D.: Preprocessing web logs for web intrusion detection. Int. J. Appl. Inf. Syst. (IJAIS) (2012)
Salama, S.E., Marie, M.I., Elfangary, L.M., Helmy, Y.K.: Web server logs preprocessing for web intrusion detection. Comput. Inf. Sci. 4(4), 123 (2011)
Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems, pp. 1097–1105 (2012)
Karpathy, A., Toderici, G., Shetty, S., Leung, T., Sukthankar, R., Li, F.F.: Large-scale video classification with convolutional neural networks. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1725–1732 (2014)
Sundermeyer, M., Schlter, R., Ney, H.: LSTM neural networks for language modeling. In: INTERSPEECH, pp. 601–608 (2012)
Graves, A., Mohamed, A.R., Hinton, G.: Speech recognition with deep recurrent neural networks, vol. 38, no. 2003, pp. 6645–6649 (2013)
Kumar, S.: Classification and detection of computer intrusions (1996)
Sebring, M.M., Shellhouse, E., Hanna, M.F., Whitehurst, R.A.: Expert systems in intrusion detection: a case study. In: World Conference on Photovoltaic Energy Conversion, pp. 32–38 (1988)
Cao, L.C.: Detecting web-based attacks by machine learning. In: International Conference on Machine Learning and Cybernetics, pp. 2737–2742 (2006)
Das, D., Sharma, U., Bhattacharyya, D.K.: An intrusion detection mechanism based on feature based data clustering. In: International Conference on Emerging Technologies, pp. 172–175 (2009)
Zhang, M., Xu, B.Y., Xu, F.: Research on web intrusion detection module based on hybrid framework. Int. J. Netw. Secur. Appl. (9), 6–9 (2015)
Barapatre, P., Tarapore, N.Z., Pukale, S.G., Dhore, M.L.: Training MLP neural network to reduce false alerts in IDS. In: International Conference on Computing, Communication and Networking, pp. 1–7 (2008)
Vasilev, J.: Network security by analysis of log files of apache web server, no. 4, pp. 66–88 (2014)
Nair, V., Hinton, G.E.: Rectified linear units improve restricted boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML 2010), pp. 807–814 (2010)
Zhang, Y., Wang, S., Phillips, P., Ji, G.: Binary PSO with mutation operator for feature selection using decision tree applied to spam detection. Knowl.-Based Syst. 64(1), 22–31 (2014)
Ng, A.Y.: Feature selection, L1 vs. L2 regularization, and rotational invariance, p. 78 (2004)
Orr, R.J., Abowd, G.D.: The smart floor: a mechanism for natural user identification and tracking. In: CHI 2000 Extended Abstracts on Human Factors in Computing Systems, pp. 275–276. ACM (2000)
Acknowledgments
This work is supported by the National Key Research, Development Program No. 2016YFB0800804 and No. 2016YFB0800303 and JSPS KAKENHI Grant Number JP16K00117, JP15K15976, and KDDI Foundation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ma, K., Jiang, R., Dong, M., Jia, Y., Li, A. (2017). Neural Network Based Web Log Analysis for Web Intrusion Detection. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-72395-2_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72394-5
Online ISBN: 978-3-319-72395-2
eBook Packages: Computer ScienceComputer Science (R0)