{"title":"Recon: Efficient Intrusion Recovery for Web Applications","authors":"Mohamed Hammad, Nabil Hewahi, Wael Elmedany","doi":"10.1002/cpe.70066","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>In the present systems, recovery from intrusions usually takes much time. Hosted web applications are vulnerable to cyberattacks and may be at risk due to HTTP requests that exploit these vulnerabilities. In this article, we present an approach to recovering web systems from cyberattacks using machine learning approaches. Our approach is called Reconstruct (Recon). Users and administrators of web applications can benefit from the Recon system that helps recover from intrusions while protecting authorized user changes. The recovery mechanism used in Recon involves carrying out the compensation operations to remove the effects of the attack and re-do the subsequently authorized actions. A system administrator can carry out the recovery operation that does not require any changes to be made to the software. In this article, a convolutional neural network is used with long short-term memory to map the requests that the application receives to the database statements executed in the database. Two extensively utilized web applications, that is, WordPress and LimeSurvey, were used to evaluate Recon. According to the findings, it is possible to remove the impact of malicious requests while maintaining legitimate application data with minimum user input at an expense of 1%–2% in throughput, 2.24–3.1 GB/day in storage, and achieving an F1-score of up to 98.56%. The obtained performance results outperform past research studies' performance overhead by up to 20×.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 6-8","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70066","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0
Abstract
In the present systems, recovery from intrusions usually takes much time. Hosted web applications are vulnerable to cyberattacks and may be at risk due to HTTP requests that exploit these vulnerabilities. In this article, we present an approach to recovering web systems from cyberattacks using machine learning approaches. Our approach is called Reconstruct (Recon). Users and administrators of web applications can benefit from the Recon system that helps recover from intrusions while protecting authorized user changes. The recovery mechanism used in Recon involves carrying out the compensation operations to remove the effects of the attack and re-do the subsequently authorized actions. A system administrator can carry out the recovery operation that does not require any changes to be made to the software. In this article, a convolutional neural network is used with long short-term memory to map the requests that the application receives to the database statements executed in the database. Two extensively utilized web applications, that is, WordPress and LimeSurvey, were used to evaluate Recon. According to the findings, it is possible to remove the impact of malicious requests while maintaining legitimate application data with minimum user input at an expense of 1%–2% in throughput, 2.24–3.1 GB/day in storage, and achieving an F1-score of up to 98.56%. The obtained performance results outperform past research studies' performance overhead by up to 20×.
期刊介绍:
Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of:
Parallel and distributed computing;
High-performance computing;
Computational and data science;
Artificial intelligence and machine learning;
Big data applications, algorithms, and systems;
Network science;
Ontologies and semantics;
Security and privacy;
Cloud/edge/fog computing;
Green computing; and
Quantum computing.