Detecting Malicious Behavior in Microservice Based Web Applications

被引:0
|
作者
Ozbek, Mustafa [1 ]
Sandikkaya, Mehmet Tahir [1 ]
机构
[1] Istanbul Tech Univ, Comp Engn Dept, TR-34469 Istanbul, Turkey
关键词
Malicious Behavior; Web Attacks; Microservice; Machine learning; Web Application; Data Classification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Not only the increased complexity of the malicious acts on the Internet, but also the continuous increase of new attack methods compromise Internet-based services as a threat to the modern society. In this study, malicious behavior in a microservices-based web application is detected by measuring the patterns of CRUD (create, read, update, delete) access. The aim of this paper is to detect malicious users (or even the first malicious attempt of a trustworthy user) as soon as the action occurred according to the characteristics of the sequential use of microservices. The proposed approach renders OWASP Foundation's Top 10 critical web application security risks as possible attack vectors. Thus, a data set including such attacks together with mostly benign behavior is generated and measured on the microservices-based web application. The data set is then used to determine benign and malicious classes of behavior using RandomForest, NaiveBayes, J48, AdaBoost, ZeroR, Bagging, Logistic Regression and K-Star machine learning algorithms. The best malicious behavior detection accuracy encountered during experiments is an auspicious 99.36% using RandomForest classification algorithm. After the classification of malicious behavior, the respective user's further access to the microservices could be blocked to prevent the waste of resources.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Transparent Tracing of Microservice-based Applications
    Santana, Matheus
    Sampaio, Adalberto, Jr.
    Andrade, Marcos
    Rosa, Nelson S.
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1252 - 1259
  • [42] Automatic Performance Simulation for Microservice Based Applications
    Sun, Yao
    Meng, Lun
    Liu, Peng
    Zhang, Yan
    Chan, Haopeng
    [J]. METHODS AND APPLICATIONS FOR MODELING AND SIMULATION OF COMPLEX SYSTEMS, 2018, 946 : 85 - 95
  • [43] Detecting Unknown Inconsistencies in Web Applications
    Ocariza, Frolin S., Jr.
    Pattabiraman, Karthik
    Mesbah, Ali
    [J]. PROCEEDINGS OF THE 2017 32ND IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE'17), 2017, : 566 - 577
  • [44] Detecting anomaly and failure in Web applications
    Ricca, F
    Tonella, P
    [J]. IEEE MULTIMEDIA, 2006, 13 (02) : 44 - 51
  • [45] Detecting Malicious Websites in Depth through Analyzing Topics and Web-pages
    Wen, Senhao
    Zhao, Zhiyuan
    Yan, Hanbing
    [J]. ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 128 - 133
  • [46] Python']PythonHoneyMonkey: Detecting Malicious Web URLs on Client Side Honeypot Systems
    Shukla, Rohit
    Singh, Maninder
    [J]. 2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [47] Detecting Malicious Inputs of Web Application Parameters using Character Class Sequences
    Zhong, Yang
    Asakura, Hiroshi
    Takakura, Hiroki
    Oshima, Yoshihito
    [J]. 39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 525 - 532
  • [48] Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites
    Wang, Jiang
    Ghosh, Anup
    Huang, Yih
    [J]. COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2009, 10 : 24 - 33
  • [49] Detecting malicious SQL
    Fonseca, Jose
    Vieira, Marco
    Madeira, Henrique
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2007, 4657 : 259 - +
  • [50] Detecting the DGA-Based Malicious Domain Names
    Zhang, Ying
    Zhang, Yongzheng
    Xiao, Jun
    [J]. TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 130 - 137