Abstract
Hypertext Transfer Protocol (HTTP) is the cornerstone for information exchanging over the World Wide Web by a huge variety of devices. It means that a massive amount of information travels over such protocol on a daily basis. Thus, it is an appealing target for attackers and the number of web attacks has increased over recent years. To deal with this matter, neural projection architectures are proposed in present work to analyze HTTP traffic and detect attacks over such protocol. By the advanced and intuitive visualization facilities obtained by neural models, the proposed solution allows providing an overview of HTTP traffic as well as identifying anomalous situations, responding to the challenges presented by volume, dynamics and diversity of that traffic. The applied dimensionality reduction based on Neural Networks, enables the most interesting projections of an HTTP traffic dataset to be extracted.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Myerson, J.M.: Identifying enterprise network vulnerabilities. Int. J. Network Manage 12(3), 135–144 (2002)
Fielding, R., Reschke, J.: Hypertext transfer protocol (HTTP/1.1): message syntax and routing. IETF RFC 7230 (2014)
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Berners-Lee, T.: Hypertext transfer protocol – HTTP/1.1. IETF RFC 2068 (1997)
Crist, J.: Web based attacks. SANS institute - infosec reading room (2007)
Ponemon Institute - Cost of Cyber Crime Study (2014)
Kaspersky Security Bulletin 2014 (2014)
Pastrana, S., Torrano-Gimenez, C., Nguyen, H., Orfila, A.: Anomalous web payload detection: evaluating the resilience of 1-grams based classifiers. In: Camacho, D., Braubach, L., Venticinque, S., Badica, C. (eds.) Intelligent Distributed Computing VIII, vol. 570, pp. 195–200. Springer International Publishing (2015)
Choraś, M., Kozik, R.: Machine learning techniques applied to detect cyber attacks on web applications. Logic J. IGPL 23(1), 45–56 (2014)
Corchado, E., Herrero, Á.: Neural visualization of network traffic data for intrusion detection. Appl. Soft. Comput. 11(2), 2042–2056 (2011)
Pinzón, C.I., De Paz, J.F., Herrero, Á., Corchado, E., Bajo, J., Corchado, J.M.: idMAS-SQL: intrusion detection based on MAS to detect and block SQL injection through data mining. Inf. Sci. 231, 15–31 (2013)
Herrero, Á., Zurutuza, U., Corchado, E.: A neural-visualization IDS for honeynet data. Int. J. Neural Syst. 22(2), 1–18 (2012)
D’Amico, A.D., Goodall, J.R., Tesone, D.R., Kopylec, J.K.: Visual discovery in computer network defense. IEEE Comput. Graphics Appl. 27(5), 20–27 (2007)
The MathWorks, Inc., Natick, Massachusetts, United States.: MATLAB (2014)
Demartines, P., Herault, J.: Curvilinear component analysis: a self-organizing neural network for nonlinear mapping of data sets. IEEE Trans. Neural Networks 8(1), 148–154 (1997)
Pearson, K.: On lines and planes of closest fit to systems of points in space. Phil. Mag. 2(6), 559–572 (1901)
Hotelling, H.: Analysis of a complex of statistical variables into principal components. J. Educ. Psychol. 24, 417–444 (1933)
Oja, E.: Principal components, minor components, and linear neural networks. Neural Networks 5(6), 927–935 (1992)
Fyfe, C.: A neural network for PCA and beyond. Neural Process. Lett. 6(1–2), 33–41 (1997)
Corchado, E., Fyfe, C.: Connectionist techniques for the identification and suppression of interfering underlying factors. Int. J. Pattern Recognit Artif Intell. 17(8), 1447–1466 (2003)
Corchado, E., MacDonald, D., Fyfe, C.: Maximum and minimum likelihood hebbian learning for exploratory projection pursuit. Data Min. Knowl. Disc. 8(3), 203–225 (2004)
Fyfe, C., Corchado, E.: Maximum likelihood hebbian rules. In: 10th European Symposium on Artificial Neural Networks (ESANN 2002), pp. 143–148 (2002)
Kohonen, T.: The self-organizing map. Proc. IEEE 78(9), 1464–1480 (1990)
Ritter, H., Martinetz, T., Schulten, K.: Neural Computation and Self-Organizing Maps; An Introduction. Addison-Wesley Longman Publishing Co., Inc., Chicago (1992)
HTTP DATASET CSIC 2010: http://www.isi.csic.es/dataset/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Atienza, D., Herrero, Á., Corchado, E. (2015). Neural Analysis of HTTP Traffic for Web Attack Detection. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-19713-5_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19712-8
Online ISBN: 978-3-319-19713-5
eBook Packages: EngineeringEngineering (R0)