Detecting Malicious Behavior in Microservice Based Web Applications

被引:0
|
作者
Ozbek, Mustafa [1 ]
Sandikkaya, Mehmet Tahir [1 ]
机构
[1] Istanbul Tech Univ, Comp Engn Dept, TR-34469 Istanbul, Turkey
关键词
Malicious Behavior; Web Attacks; Microservice; Machine learning; Web Application; Data Classification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Not only the increased complexity of the malicious acts on the Internet, but also the continuous increase of new attack methods compromise Internet-based services as a threat to the modern society. In this study, malicious behavior in a microservices-based web application is detected by measuring the patterns of CRUD (create, read, update, delete) access. The aim of this paper is to detect malicious users (or even the first malicious attempt of a trustworthy user) as soon as the action occurred according to the characteristics of the sequential use of microservices. The proposed approach renders OWASP Foundation's Top 10 critical web application security risks as possible attack vectors. Thus, a data set including such attacks together with mostly benign behavior is generated and measured on the microservices-based web application. The data set is then used to determine benign and malicious classes of behavior using RandomForest, NaiveBayes, J48, AdaBoost, ZeroR, Bagging, Logistic Regression and K-Star machine learning algorithms. The best malicious behavior detection accuracy encountered during experiments is an auspicious 99.36% using RandomForest classification algorithm. After the classification of malicious behavior, the respective user's further access to the microservices could be blocked to prevent the waste of resources.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Detecting Applications with Malicious Behavior in Android Device Based on GA and SVM
    Liu, Ning
    Yang, Min
    Zhang, Shibin
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL AND AUTOMATION ENGINEERING (ECAE 2017), 2017, 140 : 257 - 261
  • [2] Detecting Malicious Android Applications from Runtime Behavior
    Lageman, Nathaniel
    Lindsey, Mark
    Glodek, William
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 324 - 329
  • [3] Detecting Malicious Applications using System Services Request Behavior
    Salehi, Majid
    Amini, Morteza
    Crispo, Bruno
    [J]. PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, : 200 - 209
  • [4] Detecting Artifact Anomalies in Microservice-Based Financial Applications
    Fahmi, Faisal
    Huang, Pei-Shu
    Wang, Feng-Jian
    [J]. 2020 IEEE 13TH INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2020), 2020, : 418 - 421
  • [5] Detecting Malicious Facebook Applications
    Rahman, Sazzadur
    Huang, Ting-Kai
    Madhyastha, Harsha V.
    Faloutsos, Michalis
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (02) : 773 - 787
  • [6] A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications
    Ben Jaballah, Wafa
    Kheir, Nizar
    [J]. MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 1 - 12
  • [7] The Scheme of Detecting Encoded Malicious Web Pages Based on Information Entropy
    Liang, Shuang
    Ma, Yong
    Huang, Yanyu
    Guo, Jia
    Jia, Chunfu
    [J]. 2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2016, : 310 - 312
  • [8] ShellBreaker: Automatically detecting PHP-based malicious web shells
    Li, Yu
    Huang, Jin
    Ikusan, Ademola
    Mitchell, Milliken
    Zhang, Junjie
    Dai, Rui
    [J]. COMPUTERS & SECURITY, 2019, 87
  • [9] Detecting malicious Android applications based on the network packets generated
    de la Puerta, Jose Gaviria
    Pastor-Lopez, Iker
    Porto, Igone
    Sanz, Borja
    Garcia Bringas, Pablo
    [J]. NEUROCOMPUTING, 2021, 456 : 629 - 636
  • [10] METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION
    Li, Wenwu
    Li, Chao
    Duan, Miyi
    [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 234 - 240