Mining Frequent Attack Sequence in Web Logs

被引:4
|
作者
Sun, Hui [1 ]
Sun, Jianhua [1 ]
Chen, Hao [1 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha, Hunan, Peoples R China
来源
关键词
Log analysis; Web security; Web attacks; Sequential pattern mining;
D O I
10.1007/978-3-319-39077-2_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a crucial part of web servers, web logs record information about client requests. Logs contain not only the traversal sequences of malicious users but the operations of normal users. Taking advantage of web logs is important for learning the operation of websites. Furthermore, web logs are helpful when conducting postmortem security analysis. However, common methods of analyzing web logs typically focus on discovering preferred browsing paths or improving the structure of website, and thus can not be used directly in security analysis. In this paper, we propose an approach to mining frequent attack sequence based on PrefixSpan. We perform experiments on real data, and the evaluations show that our method is effective in identifying both the behavior of scanners and attack sequences in web logs.
引用
收藏
页码:243 / 260
页数:18
相关论文
共 50 条
  • [1] Efficient frequent pattern mining on web logs
    Sun, LP
    Zhang, XZ
    ADVANCED WEB TECHNOLOGIES AND APPLICATIONS, 2004, 3007 : 533 - 542
  • [2] Apriori Algorithm on Web Logs for Mining Frequent Link
    Sathya, M.
    Devi, P. Isakki
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING (INCOS), 2017,
  • [3] Frequent Sequence Mining in Web Log Data
    Weichbroth, Pawel
    MAN-MACHINE INTERACTIONS 5, ICMMI 2017, 2018, 659 : 459 - 467
  • [4] A unified approach to web usage mining based on frequent sequence mining
    Inuzuka, Nobuhiro
    Hayakawa, Jun-ichi
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT II, PROCEEDINGS, 2007, 4693 : 987 - 994
  • [5] Mining maximum frequent access patterns in web logs based on unique labeled tree
    Zhang, Ling
    Yin, Ran-ping
    Zhan, Yu-bin
    WEB INFORMATION SYSTEMS - WISE 2006 WORKSHOPS, PROCEEDINGS, 2006, 4256 : 73 - 82
  • [6] Mining on Web logs for recommendation
    College of Computer Science, Zhejiang University, 38 Zheda Road, Hangzhou 310027 Zhejiang, China
    WSEAS Trans. Comput., 2006, 9 (1818-1822):
  • [7] Mining Web Logs - An Automated Approach
    Sudhamathy, G.
    PROCEEDINGS OF THE FIRST AMRITA ACM-W CELEBRATION OF WOMEN IN COMPUTING IN INDIA (A2WIC), 2010,
  • [8] Mining web logs to locate target web pages
    Guo, Ping
    Yang, Houqun
    Chen, Ting
    Wang, Yanxia
    Journal of Computational Information Systems, 2007, 3 (04): : 1691 - 1698
  • [9] A unified representation of web logs for mining applications
    Michelangelo Diligenti
    Marco Gori
    Marco Maggini
    Information Retrieval, 2011, 14 : 215 - 236
  • [10] Research on analysis and mining of web query logs
    Fu, B. (bfu@ir.hit.edu.cn), 1800, Chinese Institute of Electronics (41):