Exploring the Application of Process Mining Techniques to Improve Web Application Security

被引:0
|
作者
Bruno, Marcelo [1 ]
Ibanez, Pablo [1 ]
Techera, Tamara [1 ]
Calegari, Daniel [1 ]
Betarte, Gustavo [1 ]
机构
[1] Univ Republica, Fac Ingn, Inst Comp, Montevideo 11300, Uruguay
关键词
Security; web applications; process mining; web application firewall; ModSecurity; ProM; CHECKING;
D O I
10.1109/CLEI53233.2021.9640192
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web applications are permanently being exposed to attacks that exploit their vulnerabilities. To detect and prevent misuse of the functionality provided by an application, it has become necessary to develop techniques that help discern between a valid user of the system and a malicious agent. In recent years, a technology that has been widely deployed to provide automated and non-invasive support for detecting web application attacks is Web Application Firewalls. In this work, we put forward and discuss the application of Process Mining techniques to detect deviations from the expected behavior of web applications. The objects of behavior analysis are logs generated by a widely deployed WAF called ModSecurity. We discuss experiments we have carried out applying our mining method on the well-known e-commerce platform Magento and using the ProM tool for the execution of the process mining techniques.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] A Study on Web Application Security and Detecting Security Vulnerabilities
    Kumar, Sandeep
    Mahajan, Renuka
    Kumar, Naresh
    Khatri, Sunil Kumar
    [J]. 2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 451 - 455
  • [42] A Solution to Improve Web Application Performance
    Huang, Yi-Ming
    Kuo, Ching-Wen
    Tsai, Ching-Tsorng
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 2185 - 2188
  • [43] Application of data mining techniques in pharmacovigilance
    Wilson, AM
    Thabane, L
    Holbrook, A
    [J]. BRITISH JOURNAL OF CLINICAL PHARMACOLOGY, 2004, 57 (02) : 127 - 134
  • [44] APPLICATION OF GEOPHYSICAL TECHNIQUES TO POTASH MINING
    PHILLIPS, GD
    MOTTAHED, P
    [J]. CIM BULLETIN, 1988, 81 (915): : 39 - 39
  • [45] Overview: Web log Mining, Privacy Issues and Application of Web Log Mining
    Singh, Amarjeet
    Sreeram, Y. Chaitanya
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 638 - 641
  • [46] An adaptive website system to improve efficiency with web mining techniques
    Lee, JH
    Shiu, WK
    [J]. ADVANCED ENGINEERING INFORMATICS, 2004, 18 (03) : 129 - 142
  • [47] Reducing Attack Surface of a Web Application by Open Web Application Security Project Compliance
    Goswami, Sumit
    Krishnan, Nabanita R.
    Mukesh
    Swarnkar, Saurabh
    Mahajan, Pallavi
    [J]. DEFENCE SCIENCE JOURNAL, 2012, 62 (05) : 324 - 330
  • [48] Web Usage Mining: A Review on Process, Methods and Techniques
    Varnagar, Chintan R.
    Madhak, Nirali N.
    Kodinariya, Trupti M.
    Rathod, Jayesh N.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 40 - 46
  • [49] Web Application Firewall Evasion Techniques
    Nagendran, K.
    Balaji, S.
    Raj, Akshay B.
    Chanthrika, P.
    Amirthaa, R. G.
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 194 - 199
  • [50] Web application protection techniques: A taxonomy
    Prokhorenko, Victor
    Choo, Kim-Kwang Raymond
    Ashman, Helen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 95 - 112