Skip to main content

Detection of Web Application Attacks with Request Length Module and Regex Pattern Analysis

  • Conference paper
  • First Online:
Genetic and Evolutionary Computing (GEC 2015)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 388))

Included in the following conference series:

  • International Conference on Genetic and Evolutionary Computing

Abstract

Web application attack detection is one of the popular research areas during these years. Security for web application is necessary and it will be effective to study and analyze how malicious patterns occur in web server log. This system analyzes web server log file, which includes normal and malicious users’ access patterns with their relevant links. This uses web server log file dataset for the detection of web application attacks. This system intends to analyze normal and attack behaviors from web server log and then classify attack types which are included in the dataset. In this system, three types of attacks are detected namely, SQL injection, XSS and directory traversal attacks. Attack analysis stage is done by request length module and regular expressions for various attack patterns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Vamsidhar, T., Ashok, R., Venkat, R.: Intrusion Detection System For Web Applications With Attack Classification. Journal of Global Research in Computer Science (2012)

    Google Scholar 

  2. Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Reliable Software Group. University of California, Santa Barbara (2005)

    Google Scholar 

  3. Meyer, R., Cid, C.: Detecting Attacks on Web Applications from Log Files. SANS Institute (2008)

    Google Scholar 

  4. Kruegel, C., Vigna, G.: Anomaly detection of Web-based attacks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security(CCS 2003), Washington, DC, October 2003, pp. 251–261. ACM Press, New York (2003)

    Google Scholar 

  5. Mookhey, K.K., Burghate, N.: Detection of SQLInjection and CrosssiteScriptingAttacks (2004). http://www.blackhat.com/presentations/bhusa04/bhus04mookhey/old/bhus04mookhey_whitepaper.pdf

  6. Robertson, W., Vigna, G., Kruegel, C., Kemmerer, R.: Using generalization and characterization techniques in the anomaly based detection of web attacks. In: 13th Annual Network and Distributed System Security Symposium, San Diego (2006)

    Google Scholar 

  7. Gallagher, B., Eliassi-Rad, T.: Classification of http attacks: A studyon the ecml/pkdd 2007 discovery challenge (2009)

    Google Scholar 

  8. Faradzhullaev, R.: Analysis of Web Server Log Files and Attack Detection. Institute of Information Technologies, Academy of Sciences of Azerbaijan (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ei Ei Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Han, E.E. (2016). Detection of Web Application Attacks with Request Length Module and Regex Pattern Analysis. In: Zin, T., Lin, JW., Pan, JS., Tin, P., Yokota, M. (eds) Genetic and Evolutionary Computing. GEC 2015. Advances in Intelligent Systems and Computing, vol 388. Springer, Cham. https://doi.org/10.1007/978-3-319-23207-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23207-2_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23206-5

  • Online ISBN: 978-3-319-23207-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics