Detection of malicious and non-malicious website visitors using unsupervised neural network learning

被引:76
|
作者
Stevanovic, Dusan [1 ]
Vlajic, Natalija [1 ]
An, Aijun [1 ]
机构
[1] York Univ, Dept Comp Sci & Engn, Toronto, ON M3J 1P3, Canada
关键词
Web crawler detection; Neural networks; Web server access logs; Machine learning; Clustering; Denial of service;
D O I
10.1016/j.asoc.2012.08.028
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distributed denials of service (DDoS) attacks are recognized as one of the most damaging attacks on the Internet security today. Recently, malicious web crawlers have been used to execute automated DDoS attacks on web sites across the WWW. In this study, we examine the use of two unsupervised neural network (NN) learning algorithms for the purpose web-log analysis: the Self-Organizing Map (SOM) and Modified Adaptive Resonance Theory 2 (Modified ART2). In particular, through the use of SOM and modified ART2, our work aims to obtain a better insight into the types and distribution of visitors to a public web-site based on their browsing behavior, as well as to investigate the relative differences and/or similarities between malicious web crawlers and other non-malicious visitor groups. The results of our study show that, even though there is a pretty clear separation between malicious web-crawlers and other visitor groups, 52% of malicious crawlers exhibit very 'human-like' browsing behavior and as such pose a particular challenge for future web-site security systems. Also, we show that some of the feature values of malicious crawlers that exhibit very 'human-like' browsing behavior are not significantly different than the features values of human visitors. Additionally, we show that Google, MSN and Yahoo crawlers exhibit distinct crawling behavior. (C) 2012 Elsevier B. V. All rights reserved.
引用
收藏
页码:698 / 708
页数:11
相关论文
共 50 条
  • [1] Non-malicious taint: Bad hygiene is as dangerous to the mission as malicious intent
    [J]. Martin, R.A. (ramartin@mitre.org), 1600, U.S. Department of Defense (27):
  • [2] Noisy but non-malicious user detection in social recommender systems
    Li, Bin
    Chen, Ling
    Zhu, Xingquan
    Zhang, Chengqi
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2013, 16 (5-6): : 677 - 699
  • [3] Learning URL Embedding for Malicious Website Detection
    Yan, Xiaodan
    Xu, Yang
    Cui, Baojiang
    Zhang, Shuhan
    Guo, Taibiao
    Li, Chaoliang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (10) : 6673 - 6681
  • [4] DIFFERENTIATION OF MALICIOUS AND NON-MALICIOUS FIRE-ALARM CALLS USING MULTIDIMENSIONAL-SCALING
    COMBER, M
    CANTER, D
    [J]. PERCEPTUAL AND MOTOR SKILLS, 1983, 57 (02) : 460 - 462
  • [5] Noisy but non-malicious user detection in social recommender systems
    Bin Li
    Ling Chen
    Xingquan Zhu
    Chengqi Zhang
    [J]. World Wide Web, 2013, 16 : 677 - 699
  • [6] Hardware-assisted Neural Network IP Protection using Non-malicious Backdoor and Selective Weight Obfuscation
    Grailoo, Mahdieh
    Reinsalu, Uljana
    Leier, Mairo
    Nikoubin, Tooraj
    [J]. PROCEEDINGS OF THE 2022 15TH IEEE DALLAS CIRCUITS AND SYSTEMS CONFERENCE (DCAS 2022), 2022,
  • [7] Physical Layer Detection of Malicious Relays in LTE-A Network Using Unsupervised Learning
    Yengi, Yeliz
    Kavak, Adnan
    Arslan, Huseyin
    [J]. IEEE ACCESS, 2020, 8 (08): : 154713 - 154726
  • [8] Malicious Website Detection Through Deep Learning Algorithms
    Gutierrez, Norma
    Otero, Beatriz
    Rodriguez, Eva
    Canal, Ramon
    [J]. MACHINE LEARNING, OPTIMIZATION, AND DATA SCIENCE (LOD 2021), PT I, 2022, 13163 : 512 - 526
  • [9] Malicious website identification using design attribute learning
    Naim, Or
    Cohen, Doron
    Ben-Gal, Irad
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1207 - 1217
  • [10] Malicious website identification using design attribute learning
    Or Naim
    Doron Cohen
    Irad Ben-Gal
    [J]. International Journal of Information Security, 2023, 22 : 1207 - 1217