Access Log Anomaly Detection

Ma. Tharshini, M. Ragavinodini, R. Senthilkumar
{"title":"Access Log Anomaly Detection","authors":"Ma. Tharshini, M. Ragavinodini, R. Senthilkumar","doi":"10.1109/ICOAC.2017.8441194","DOIUrl":null,"url":null,"abstract":"Maintaining network security is very important and tedious in today's world. Since web applications are not built on sound security methodology, they are the major target for the attackers. Analyzing access logs for detecting anomalous activities is a form of defense achieved in this paper. Anomaly detection is important because if the anomalies are not detected apriori, it may lead to hacking of the entire system. This paper is based on analyzing the stored access logs and detecting the anomalous events. Our experiment evaluates both static and dynamic logs. In dynamic implementation, the pattern matching approach is used to detect the anomalies from access logs. In Weka, the supervised neural network approach gives better anomaly prediction than unsupervised neural network approach for static logs. Maximum prediction accuracy is achieved in supervised neural networks by using Naive Bayes Multinomial Text Algorithm. Since the input attributes (logs) are strings, the use of Bayes classifier gives us a better accuracy rate while compared to other classifier algorithms. The proposed approach identifies the suspicious activities and serious anomalies that may be one of the way for the hackers to hack our system. Overall error rate of our supervised method is less than 10% and unsupervised method is approximately 30%.","PeriodicalId":329949,"journal":{"name":"2017 Ninth International Conference on Advanced Computing (ICoAC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Ninth International Conference on Advanced Computing (ICoAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOAC.2017.8441194","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Maintaining network security is very important and tedious in today's world. Since web applications are not built on sound security methodology, they are the major target for the attackers. Analyzing access logs for detecting anomalous activities is a form of defense achieved in this paper. Anomaly detection is important because if the anomalies are not detected apriori, it may lead to hacking of the entire system. This paper is based on analyzing the stored access logs and detecting the anomalous events. Our experiment evaluates both static and dynamic logs. In dynamic implementation, the pattern matching approach is used to detect the anomalies from access logs. In Weka, the supervised neural network approach gives better anomaly prediction than unsupervised neural network approach for static logs. Maximum prediction accuracy is achieved in supervised neural networks by using Naive Bayes Multinomial Text Algorithm. Since the input attributes (logs) are strings, the use of Bayes classifier gives us a better accuracy rate while compared to other classifier algorithms. The proposed approach identifies the suspicious activities and serious anomalies that may be one of the way for the hackers to hack our system. Overall error rate of our supervised method is less than 10% and unsupervised method is approximately 30%.
访问日志异常检测
维护网络安全在当今世界是非常重要和繁琐的。由于web应用程序不是基于可靠的安全方法构建的,因此它们是攻击者的主要目标。分析访问日志以检测异常活动是本文实现的一种防御形式。异常检测非常重要,因为如果没有先验地检测到异常,可能会导致整个系统被黑客攻击。本文基于对存储的访问日志的分析和异常事件的检测。我们的实验评估了静态和动态日志。在动态实现中,采用模式匹配的方法检测访问日志中的异常。在Weka中,对于静态日志,监督神经网络方法比无监督神经网络方法给出了更好的异常预测。采用朴素贝叶斯多项文本算法实现了监督神经网络的最大预测精度。由于输入属性(日志)是字符串,与其他分类器算法相比,贝叶斯分类器的使用为我们提供了更好的准确率。建议的方法识别可疑活动和严重异常,这可能是黑客入侵我们系统的方式之一。有监督方法的总体错误率小于10%,无监督方法的总体错误率约为30%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信