Anomaly detection in the web logs using user-behaviour networks

被引:0
|
作者
You J. [1 ]
Wang X. [1 ]
Jin L. [1 ]
Zhang Y. [1 ]
机构
[1] School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing
关键词
Anomaly detection; Graph theory; User behaviour; Web engineering;
D O I
10.1504/IJWET.2019.102871
中图分类号
学科分类号
摘要
With the rapid growth of the web attacks, anomaly detection becomes a necessary part in the management of modern large-scale distributed web applications. As the record of the user behaviour, web logs certainly become the research object relate to anomaly detection. Many anomaly detection methods based on automated log analysis have been proposed. However, most researches focus on the content of the single logs, while ignoring the connection between the user and the path. To address this problem, we introduce the graph theory into the anomaly detection and establish a user behaviour network model. Integrating the network structure and the characteristic of anomalous users, we propose five indicators to identify the anomalous users and the anomalous logs. Results show that the method gets a better performance on four real web application log datasets, with a total of about 4 million log messages and 1 million anomalous instances. In addition, this paper integrates and improves a state-of-the-art anomaly detection method, to further analyse the composition of the anomalous logs. We believe that our work will bring a new angle to the research field of the anomaly detection. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:178 / 199
页数:21
相关论文
共 50 条
  • [1] User Profiling in Anomaly Detection of Authorization Logs
    Zamanian, Zahedeh
    Feizollah, Ali
    Anuar, Nor Badrul
    Kiah, Laiha Binti Mat
    Srikanth, Karanam
    Kumar, Sudhindra
    COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 59 - 65
  • [2] A Comprehensive Review of Anomaly Detection in Web Logs
    Majd, Mehryar
    Najafi, Pejman
    Alhosseini, Seyed Ali
    Cheng, Feng
    Meinel, Christoph
    2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 158 - 165
  • [3] Anomaly Detection of Malicious Users' Behaviors for Web Applications Based on Web Logs
    Gao, Yang
    Ma, Yan
    Li, Dandan
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1352 - 1355
  • [4] User Behaviour Anomaly Detection in Multidimensional Data
    Prarthana, T. S.
    Gangadhar, N. D.
    2017 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM 2017), 2017, : 3 - 10
  • [5] Anomaly Detection in Logs Using Deep Learning
    Aziz, Ayesha
    Munir, Kashif
    IEEE ACCESS, 2024, 12 : 176124 - 176135
  • [6] Automated Learning of User-Behaviour Patterns in Intelligent House Environment
    Adamek, Dominika
    Popek, Grzegorz
    2017 10TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI), 2017,
  • [7] ELSV: An Effective Anomaly Detection System from Web Access Logs
    Wan, Wei
    Shi, Xin
    Wei, Jinxia
    Zhao, Jing
    Long, Chun
    2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,
  • [8] Anomaly Detection in Security Logs using Sequence Modeling
    Gokstorp, Simon
    Nyberg, Jakob
    Kim, Yeongwoo
    Johnson, Pontus
    Dan, Gyorgy
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [9] Anomaly Detection in the Dynamics of Web and Social Networks Using Associative Memory
    Miz, Volodymyr
    Ricaud, Benjamin
    Benzi, Kirell
    Vandergheynst, Pierre
    WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), 2019, : 1290 - 1299
  • [10] Effectively capturing user navigation paths in the Web using Web server logs
    Caldera, A
    Deshpande, Y
    WEB ENGINEERING, PROCEEDINGS, 2005, 3579 : 63 - 68