Using Multiclass Machine Learning Methods to Classify Malicious Behaviors Aimed at Web Systems

Software Reliability Engineering(2012)

引用 22|浏览8
暂无评分
摘要
The number of vulnerabilities and attacks on Web systems show an increasing trend and tend to dominate on the Internet. Furthermore, due to their popularity and users ability to create content, Web 2.0 applications have become particularly attractive targets. These trends clearly illustrate the need for better understanding of malicious cyber activities based on both qualitative and quantitative analysis. This paper is focused on multiclass classification of malicious Web activities using three supervised machine learning methods: J48, PART, and Support Vector Machines (SVM). The empirical analysis is based on data collected in duration of nine months by a high interaction honey pot consisting of a three-tier Web system, which included Web 2.0 applications (i.e., a blog and wiki). Our results show that supervised learning methods can be used to efficiently distinguish among multiple vulnerability scan and attack classes, with high recall and precision values for all but several very small classes. For our dataset, decision tree based methods J48 and PART perform slightly better than SVM in terms of overall accuracy and weighted recall. Additionally, J48 and PART require less than half of the features (i.e., session attributes) used by SVM, as well as they execute much faster. Therefore, they seem to be clear methods of choice.
更多
查看译文
关键词
Internet,learning (artificial intelligence),pattern classification,security of data,support vector machines,Internet,J48,PART,SVM,Web 2.0 applications,attack classes,high-interaction honeypot,malicious behavior classification,malicious cyber activities,multiclass machine learning methods,multiclass malicious Web activities classification,qualitative analysis,quantitative analysis,supervised machine learning methods,support vector machines,three-tier Web system,Web 2.0 security,attacks,empirical study,multiclass classification,vulnerability scans
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要