Behavior Analysis of Web Service Attacks

被引:0
|
作者
Ghourabi, Abdallah [1 ]
Abbes, Tarek [1 ]
Bouhoula, Adel [1 ]
机构
[1] Univ Carthage, Higher Sch Commun Tunis SUPCOM, Tunis, Tunisia
关键词
Honeypot; Web Service; Attacker's Behavior; Clustering; Data Analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet and its services, cyber attacks are increasingly emerging and evolving nowadays. To be aware of new attacks and elaborate the appropriate protection mechanisms, an interesting idea is to attract attackers, then to automatically monitor their activities and analyze their behaviors. In this paper, we are particularly interested in detecting and learning attacks against web services. We propose an approach that describes the attacker's behavior based on data collected from the deployment of a web service honeypot. The strengths of our approach are that (1) it offers a high interaction environment, able to collect valuable information about malicious activities; (2) our solution preprocesses the set of data attributes in order to keep only significant ones (3) it ensures two levels of clustering in order to produce more concise attack scenarios. In order to achieve these contributions, we employ three analysis techniques: Principal Component Analysis, Spectral Clustering and Sequence Clustering. Our experimental tests allow us discovering some attacks scenarios, such as SQL Injection and Denial of Services (DoS), that are modeled in Markov chains.
引用
收藏
页码:366 / 379
页数:14
相关论文
共 50 条
  • [1] Performance Analysis of Web Service under DDoS Attacks
    Sachdeva, Monika
    Kumar, Krishan
    Singh, Gurvinder
    Singh, Kuldip
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1002 - +
  • [2] A Taxonomy of Web Service Attacks
    Chan, Ka Fai Peter
    Olivier, Martin
    van Heerden, Renier Pelser
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 34 - 42
  • [3] State behavior analysis in validating the web service framework
    Maheswari, S.
    Selwyn, Justus
    [J]. International Journal of Computers and Applications, 2021, 43 (07): : 632 - 642
  • [4] Shilling Attacks Analysis in Collaborative Filtering Based Web Service Recommendation Systems
    Li, Xiang
    Gao, Min
    Rong, Wenge
    Xiong, Qingyu
    Wen, Junhao
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2016, : 538 - 545
  • [5] Empirical Analysis of Web Attacks
    Kaur, Daljit
    Kaur, Parminder
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 298 - 306
  • [6] Assessing the security of web service frameworks against Denial of Service attacks
    Oliveira, Rui Andre
    Laranjeiro, Nuno
    Vieira, Marco
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 109 : 18 - 31
  • [7] WEB SERVICE REGISTRATION AND ROUTING SYSTEM AND INTER WEB PROXY SERVICE MODEL PREVENTS THE MESSAGE ALTERATION ATTACKS, MAN-IN-THE MIDDLE ATTACKS
    Chakaravarthi, S.
    Visu, P.
    Balu, B.
    Vineshwaran, V.
    Yakeshraj, M.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2017,
  • [8] Analysis of the Attacks on Saudi Web Companies
    Almarri, Deema
    Alhazza, Munaira
    Aljamea, Moudhi
    Mahmud, Maqsood
    [J]. 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [9] Petri Net based Web Service Interactive Behavior Compatibility Analysis
    Zhang, Shuai
    Sun, Jianling
    Yin, Keting
    Xu, Bin
    [J]. ISBIM: 2008 INTERNATIONAL SEMINAR ON BUSINESS AND INFORMATION MANAGEMENT, VOL 1, 2009, : 473 - 476
  • [10] Characterization of attacks collected from the deployment of Web service honeypot
    Ghourabi, Abdallah
    Abbes, Tarek
    Bouhoula, Adel
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 338 - 351