Visualizing web server attacks: patterns in PHPIDS logs

被引:5
|
作者
Alsaleh, Mansour [1 ]
Alarifi, Abdulrahman [1 ]
Alqahtani, Abdullah [2 ]
Al-Salman, AbdulMalik [2 ]
机构
[1] King Abdulaziz City Sci & Technol, Comp Res Inst, Riyadh, Saudi Arabia
[2] King Saud Univ, Dept Comp Sci, Riyadh, Saudi Arabia
关键词
security data visualization; log visualization; intrusion detection systems; network monitoring; web server attacks;
D O I
10.1002/sec.1147
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The prevalence and severity of application-layer vulnerabilities increase dramatically their corresponding attacks. In this paper, we present an extension to PHPIDS, an open source intrusion detection and prevention system for PHP-based web applications, to visualize its security log. Our usage of security data visualization is motivated by the fact that most security defense systems are mainly based on text-based logs for recording security-related events, which are difficult to analyze and correlate. The proposed extension analyzes PHPIDS logs, correlates these logs with the corresponding web server logs, and plots the security-related events. We use a set of tightly coupled visual representations of hypertext transfer protocol server requests containing known and suspicious malicious content, to provide system administrators and security analysts with fine-grained visual-based querying capabilities. We present multiple case studies to demonstrate the ability of our PHPIDS visualization extension to support security analysts with analytic reasoning and decision making in response to ongoing web server attacks. Experimenting the proposed PHPIDS visualization extension on real-world datasets shows promise for providing complementary information for effective situational awareness. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1991 / 2003
页数:13
相关论文
共 50 条
  • [41] Methods for Preventing Search Engine-Based Web Server Attacks
    Murugesan, Keerthiram
    Singhal, Mukesh
    [J]. TRENDS IN COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY, 2011, 204 : 11 - 18
  • [42] Implementation of an advanced method for auditing web application server logs using access record
    [J]. Kim, D. (dskim@ssu.ac.kr), 1600, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (05):
  • [43] Extracting Usage Patterns from Web Server Log
    Jeba, J. Monisha Privthy
    Bhuvaneswari, M. S.
    Muneeswaran, K.
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON GREEN HIGH PERFORMANCE COMPUTING (ICGHPC), 2016,
  • [44] OpenWebServer: An adaptive web server using software patterns
    Suzuki, J
    Yamamoto, Y
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1999, 37 (04) : 46 - 52
  • [45] A top-down algorithm for mining web access patterns from web logs
    Guo, JK
    Ruan, BJ
    Cheng, ZP
    Su, FZ
    Wang, YQ
    Deng, XB
    Shang, N
    Zhu, YY
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2005, 3518 : 838 - 843
  • [46] T-REX: a web server for inferring, validating and visualizing phylogenetic trees and networks
    Alix, Boc
    Boubacar, Diallo Alpha
    Vladimir, Makarenkov
    [J]. NUCLEIC ACIDS RESEARCH, 2012, 40 (W1) : W573 - W579
  • [47] R-chie: a web server and R package for visualizing RNA secondary structures
    Lai, Daniel
    Proctor, Jeff R.
    Zhu, Jing Yun A.
    Meyer, Irmtraud M.
    [J]. NUCLEIC ACIDS RESEARCH, 2012, 40 (12)
  • [48] Linguistic summarization of the contents of Web server logs via the Ordered Weighted Averaging (OWA) operators
    Kacprzyk, Janusz
    Zadrozny, Slawomir
    [J]. FUZZY SETS AND SYSTEMS, 2016, 285 : 182 - 198
  • [49] Technical Perspective Attacks Target Web Server Logic And Prey on XCS Weaknesses
    Wang, Helen
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (08) : 104 - 104
  • [50] Two-Step Hierarchical Scheme for Detecting Detoured Attacks to the Web Server
    Choi, Byungha
    Cho, Kyungsan
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 633 - 649