The Community for Technology Leaders
2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA) (2014)
BC, Canada
May 13, 2014 to May 16, 2014
ISBN: 978-1-4799-2652-7
pp: 42-48
ABSTRACT
The number of vulnerabilities and reported attacks on Web systems are showing increasing trends, which clearly illustrate the need for better understanding of malicious cyber activities. In this paper we use clustering to classify attacker activities aimed at Web systems. The empirical analysis is based on four datasets, each in duration of several months, collected by high-interaction honey pots. The results show that behavioral clustering analysis can be used to distinguish between attack sessions and vulnerability scan sessions. However, the performance heavily depends on the dataset. Furthermore, the results show that attacks differ from vulnerability scans in a small number of features (i.e., session characteristics). Specifically, for each dataset, the best feature selection method (in terms of the high probability of detection and low probability of false alarm) selects only three features and results into three to four clusters, significantly improving the performance of clustering compared to the case when all features are used. The best subset of features and the extent of the improvement, however, also depend on the dataset.
INDEX TERMS
honeypots, classification of malicious cyber activities, attacks, vulnerability scans, Web applications
CITATION

K. Goseva-Popstojanova and A. Dimitrijevikj, "Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics," 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), BC, Canada, 2014, pp. 42-48.
doi:10.1109/WAINA.2014.15
98 ms
(Ver 3.3 (11022016))