Machine Learning to Detect Anomalies in Web Log Analysis

被引:0
|
作者
Cao, Qimin [1 ]
Qiao, Yinrong [1 ]
Lyu, Zhong [2 ]
机构
[1] East China Normal Univ, Sch Comp Sci & Software Engn, Shanghai, Peoples R China
[2] Shanghai Int Studies Univ, Shanghai, Peoples R China
关键词
machine learning; anomaly detection; log files component; MODELS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the information technology develops rapidly, Web servers are easily to be attacked because of their high value. Therefore, Web security has aroused great concern in both academia and industry. Anomaly detection plays a significant role in the field of Web security, and log messages recording detailed system runtime information has become an important data analysis object accordingly. Traditional log anomaly detection relies on programmers to manually inspect by keyword search and regular expression match. Although the programmers can use intrusion detection system to reduce their workload, yet the log system data is huge, attack types are various, and hacking skills are improving, which make the traditional detection not efficient enough. To improve the traditional detection technology, many of anomaly detection mechanisms have been proposed in recent years, especially the machine learning method. In this paper, an anomaly detection system for web log files has been proposed, which adopts a two-level machine learning algorithm. The decision tree model classifies normal and anomalous data sets. The normal data set is manually checked for the establishment of multiple HMMs. The experimental data comes from the real industrial environment where log files have been collected, which contain many true intrusion messages. After comparing with three types of machine learning algorithms used in anomaly detection, the experimental results on this data set suggest that this system achieves higher detection accuracy and can detect unknown anomaly data.
引用
收藏
页码:519 / 523
页数:5
相关论文
共 50 条
  • [1] Using automated machine learning to detect kidney anomalies.
    Heard, John
    Castaneda, Peris
    Davood, Joshua
    Ahdoot, Michael
    JOURNAL OF CLINICAL ONCOLOGY, 2024, 42 (4_SUPPL) : 483 - 483
  • [2] Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles
    Shirazi, Hossein
    Ray, Indrakshi
    Anderson, Charles
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 39 - 55
  • [3] Comparison of Machine Learning Methods to Detect Anomalies in the Activity of Dairy Cows
    Wagner, Nicolas
    Antoine, Violaine
    Koko, Jonas
    Mialon, Marie-Madeleine
    Lardy, Romain
    Veissier, Isabelle
    FOUNDATIONS OF INTELLIGENT SYSTEMS (ISMIS 2020), 2020, 12117 : 342 - 351
  • [4] A novel machine learning pipeline to detect malicious anomalies for the Internet of Things
    Shukla, Raj Mani
    Sengupta, Shamik
    INTERNET OF THINGS, 2022, 20
  • [5] Integrating remote sensing and machine learning to detect turbidity anomalies in hydroelectric reservoirs
    Souza, Anderson P.
    Oliveira, Bruno A.
    Andrade, Mauren L.
    Starling, Maria Clara V. M.
    Pereira, Alexandre H.
    Maillard, Philippe
    Nogueira, Keiller
    dos Santos, Jefersson A.
    Amorim, Camila C.
    SCIENCE OF THE TOTAL ENVIRONMENT, 2023, 902
  • [6] Machine learning techniques applied to detect cyber attacks on web applications
    Choras, Michal
    Kozik, Rafal
    LOGIC JOURNAL OF THE IGPL, 2015, 23 (01) : 45 - 56
  • [7] Applying Machine Learning Techniques to Detect and Analyze Web Phishing Attacks
    Cuzzocrea, Alfredo
    Martinelli, Fabio
    Mercaldo, Francesco
    IIWAS2018: THE 20TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES, 2014, : 355 - 359
  • [8] CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks
    Sarker, Iqbal H.
    INTERNET OF THINGS, 2021, 14
  • [9] Analysis of Network log data using Machine Learning
    Allagi, Shridhar
    Rachh, Rashmi
    2019 IEEE 5TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2019,
  • [10] Threshold based Technique to Detect Anomalies using Log Files
    Akande, Toluwalope David
    Kaur, Barjinder
    Dadkhah, Sajjad
    Ghorbani, Ali A.
    PROCEEDINGS OF 2022 7TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING TECHNOLOGIES, ICMLT 2022, 2022, : 191 - 198