Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4587
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHubballi, Neminathen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:34:54Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:34:54Z-
dc.date.issued2019-
dc.identifier.citationAgarwal, V., Hubballi, N., Chitrakar, A. S., & Franke, K. (2019). Identifying anomalous HTTP traffic with association rule mining. Paper presented at the International Symposium on Advanced Networks and Telecommunication Systems, ANTS, , 2019-December doi:10.1109/ANTS47819.2019.9118146en_US
dc.identifier.isbn9781728137155-
dc.identifier.issn2153-1684-
dc.identifier.otherEID(2-s2.0-85087275670)-
dc.identifier.urihttps://doi.org/10.1109/ANTS47819.2019.9118146-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4587-
dc.description.abstractWeb applications are compromised by exploiting different vulnerabilities. The protection systems designed to detect such attacks, screen the HTTP requests to decide whether a particular request is benign or malicious. Generating effective screening rules governs the detection performance and false positive rate. In this paper, we propose to generate classification rules to identify malicious HTTP requests using co-occurrence between certain character combinations. Our idea is motivated by the fact that, a successful attack will have some combination of characters together. For e.g., in an SQL injection attack = sign may appear along with '''. We propose to learn such character combinations using association rules with a set of carefully chosen feature (character) set. We experiment with a publicly available HTTP dataset and show that malicious HTTP requests can be identified with rules generated from such associations. © 2019 IEEE.en_US
dc.language.isoenen_US
dc.publisherIEEE Computer Societyen_US
dc.sourceInternational Symposium on Advanced Networks and Telecommunication Systems, ANTSen_US
dc.subjectAssociation rulesen_US
dc.subjectClassification rulesen_US
dc.subjectCo-occurrenceen_US
dc.subjectDetection performanceen_US
dc.subjectFalse positive ratesen_US
dc.subjectHTTP trafficen_US
dc.subjectProtection systemsen_US
dc.subjectSql injection attacksen_US
dc.subjectWEB applicationen_US
dc.subjectHTTPen_US
dc.titleIdentifying Anomalous HTTP Traffic with Association Rule Miningen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: