Abstract

In contrast to traditional Intrusion Detection Systems (IDSs), data mining anomaly detection methods/techniques has been widely used in the domain of network traffic data for intrusion detection and cyber threat. Data mining is widely recognized as popular and important intelligent and automatic tools to assist humans in big data security analysis and anomaly detection over IDSs. In this study we discuss our review in data mining anomaly detection methods for HTTP web services. Today, many online careers and actions including online shopping and banking are running through web-services. Consequently, the role of Hypertext Transfer Protocol (HTTP) in web services is crucial, since it is the standard facilitator for communication protocol. Hence, among the intruders that bound attacks, HTTP is being considered as a vital middle objective. In the recent years, an effective system that has attracted the attention of the researchers is the anomaly detection which is based on data mining methods. We provided an overview on four general data mining techniques such as classification, clustering, semi-supervised and association rule mining. These data mining anomaly detection methods can be used to computing intelligent HTTP request data, which are necessary in describing user behavior. To meet the challenges of data mining techniques, we provide challenges and issues section for intrusion detection systems in HTTP web services.

Highlights

  • Web application is another name of the software inside the server that produces real time content of the web (Igino Corona, 2010)

  • We proposed a comprehensive survey of anomaly detection systems using data mining methods/techniques for Hypertext Transfer Protocol (HTTP) web services in the recent past and present

  • The key ideas are to review data mining techniques to discover consistent and useful patterns of system features over HTTP web services and introduce the set of classifiers learning such as classification, clustering, semi-supervised and association rule mining that can identify anomalies and known attacks

Read more

Summary

Introduction

Web application is another name of the software inside the server that produces real time content of the web (Igino Corona, 2010). Many of the online activities and networks such as, internet banking, social networks, email and search engines are nowadays utilized as web applications or browsers which communicate with web services by making use of HTTP protocols. The standard communication protocol of web services is making a widespread use of HTTP (Torrano-gimenez et al, 2010). Both the list of Common Vulnerabilities and Exposures (CVE) (Christey and Martin, 2007) and the recent research on security issues in the digital network of the world show that 25 percent of the total security threats were related to web application vulnerabilities (Vasudevan et al, 2011)

Objectives
Methods
Findings
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.