{"title":"Access Log Anomaly Detection","authors":"Ma. Tharshini, M. Ragavinodini, R. Senthilkumar","doi":"10.1109/ICOAC.2017.8441194","DOIUrl":null,"url":null,"abstract":"Maintaining network security is very important and tedious in today's world. Since web applications are not built on sound security methodology, they are the major target for the attackers. Analyzing access logs for detecting anomalous activities is a form of defense achieved in this paper. Anomaly detection is important because if the anomalies are not detected apriori, it may lead to hacking of the entire system. This paper is based on analyzing the stored access logs and detecting the anomalous events. Our experiment evaluates both static and dynamic logs. In dynamic implementation, the pattern matching approach is used to detect the anomalies from access logs. In Weka, the supervised neural network approach gives better anomaly prediction than unsupervised neural network approach for static logs. Maximum prediction accuracy is achieved in supervised neural networks by using Naive Bayes Multinomial Text Algorithm. Since the input attributes (logs) are strings, the use of Bayes classifier gives us a better accuracy rate while compared to other classifier algorithms. The proposed approach identifies the suspicious activities and serious anomalies that may be one of the way for the hackers to hack our system. Overall error rate of our supervised method is less than 10% and unsupervised method is approximately 30%.","PeriodicalId":329949,"journal":{"name":"2017 Ninth International Conference on Advanced Computing (ICoAC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Ninth International Conference on Advanced Computing (ICoAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOAC.2017.8441194","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Maintaining network security is very important and tedious in today's world. Since web applications are not built on sound security methodology, they are the major target for the attackers. Analyzing access logs for detecting anomalous activities is a form of defense achieved in this paper. Anomaly detection is important because if the anomalies are not detected apriori, it may lead to hacking of the entire system. This paper is based on analyzing the stored access logs and detecting the anomalous events. Our experiment evaluates both static and dynamic logs. In dynamic implementation, the pattern matching approach is used to detect the anomalies from access logs. In Weka, the supervised neural network approach gives better anomaly prediction than unsupervised neural network approach for static logs. Maximum prediction accuracy is achieved in supervised neural networks by using Naive Bayes Multinomial Text Algorithm. Since the input attributes (logs) are strings, the use of Bayes classifier gives us a better accuracy rate while compared to other classifier algorithms. The proposed approach identifies the suspicious activities and serious anomalies that may be one of the way for the hackers to hack our system. Overall error rate of our supervised method is less than 10% and unsupervised method is approximately 30%.