18
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks

      , , ,
      Security and Communication Networks
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The global usage of more sophisticated web-based application systems is obviously growing very rapidly. Major usage includes the storing and transporting of sensitive data over the Internet. The growth has consequently opened up a serious need for more secured network and application security protection devices. Security experts normally equip their databases with a large number of signatures to help in the detection of known web-based threats. In reality, it is almost impossible to keep updating the database with the newly identified web vulnerabilities. As such, new attacks are invisible. This research presents a novel approach of Intrusion Detection System (IDS) in detecting unknown attacks on web servers using the Unified Intrusion Anomaly Detection (UIAD) approach. The unified approach consists of three components (preprocessing, statistical analysis, and classification). Initially, the process starts with the removal of irrelevant and redundant features using a novel hybrid feature selection method. Thereafter, the process continues with the application of a statistical approach to identifying traffic abnormality. We performed Relative Percentage Ratio (RPR) coupled with Euclidean Distance Analysis (EDA) and the Chebyshev Inequality Theorem (CIT) to calculate the normality score and generate a finest threshold. Finally, Logitboost (LB) is employed alongside Random Forest (RF) as a weak classifier, with the aim of minimising the final false alarm rate. The experiment has demonstrated that our approach has successfully identified unknown attacks with greater than a 95% detection rate and less than a 1% false alarm rate for both the DARPA 1999 and the ISCX 2012 datasets.

          Related collections

          Most cited references33

          • Record: found
          • Abstract: not found
          • Article: not found

          An Intrusion-Detection Model

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Toward developing a systematic approach to generate benchmark datasets for intrusion detection

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Additive logistic regression: a statistical view of boosting (With discussion and a rejoinder by the authors)

                Bookmark

                Author and article information

                Journal
                Security and Communication Networks
                Security and Communication Networks
                Hindawi Limited
                1939-0114
                1939-0122
                2017
                2017
                : 2017
                :
                : 1-18
                Article
                10.1155/2017/2539034
                72193a8d-ebeb-4259-b427-a172a15f8e40
                © 2017

                http://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article