Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.2.211

HTTP Intrusion Detection Model Using Machine Learning in Hadoop Environment  

Kim, Hyung-gi (Graduate School of Information & Communications SungKyunKwan University)
Kim, Moon-hyun (Graduate School of Information & Communications SungKyunKwan University)
Abstract
Since the mobile era, Internet traffic usage has been increasing exponentially, and through this, various intrusion accidents and abnormal traffic are increasing rapidly. Recently, infringement accidents are occurring in a more diversified, intelligent and complex form, and various methods other than the existing methods are required to detect them. Therefore, in this study, a method to detect web service intrusion attempts by collecting HTTP service traffic as big data is implemented and verified using SVM and decision tree, which is a machine learning-based supervised learning without using patterns. In order to compensate for the limitations, I would like to study how to apply the Word to Vector method based on unsupervised learning.
Keywords
Machine Learning; Word to Vector; SVM; Hadoop;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Hadi Pouransari , Saman Ghili "Deep learning for sentiment analysis of movie reviews", Computational and Mathematical Engineering, Stanford University, Aug. 2019
2 Gajanan Shinje, Sanjhya S. Waghere, "Analysis of SQL Injection Using DVWA Tool", Annals of Computer Science and Information Systems Vol. 10, pp. 107-110, Mar. 2017   DOI
3 Gensim Word2vec embeddings, "word2 vec", https://radimrehurek.com/gensim/models/word2vec.html, Jul. 2019
4 Github Web Attack Payloads, "Attack payload", https://github.com/foospidy/payloads, May. 2020
5 Yousef Bakhdlaghi, "Snort and SSL/TLS Inspection", SANS Institute, 11200 Rockville Pike, Suite 200, North Bethesda, MD 20852 , 23 pages, Apr. 2017
6 WENCHUAN YANG, WEN ZUO, BAOJIANG CUI, "Detecting Malicious URLs via a Keyword-Based Convolutional Gated-Recurrent-Unit Neural Network", IEEE Access Vol. 7, pp. 29891-29900, Mar. 2019   DOI
7 Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh, "Evaluation of Machine Learning Algorithms for Intrusion Detection System", IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), pp. 277-282, Oct. 2017
8 Yao Pan, Fangzhou Sun, Zhongwei Teng, Jules White, Douglas C. Schmidt, Jacob Staples, Lee Krause "Detecting web attacks with end-to-end deep learning" Journal of Internet Services and Applications Vol. 10, Article No. 16, Aug. 2019
9 Dragos Gravrilut, Mihai Cimpoesu, Dan Anton, Liviu Ciortuz, "Malware Detection Using Perceptrons and Support Vector Machinesg", 2009 Computation World: Future Computing, Service Computation, Congnitive, Adaptive, Content, Patterns, pp. 283-288, Dec. 2009
10 Hae-Duck J. Jeong, Myeong-Un Ryu, Min-Jun Ji, You-Been Cho, Sang-Kug Ye, Jong-Suk R. Lee "DDoS Attack Analysis Using the Improved ATMSim" , Journal of Internet Computing and Services Vol. 17, No. 2, pp. 19-28, Apr. 2016   DOI
11 Chan Kyou Hwang, Jong Kyu Seong, Min Hyung Lee, Jae Hyung Yoo, "Design of Implementation on real-time Anomaly Traffic Lookup & Analysis System", The Committe on Korean Network Operations and Management Review Vol.10, No. 1, pp. 43-55, Aug. 2007
12 Wonchul Kang, Yeonhee Lee, Youngseok Lee "A Hadoop-based Traffic Analysis System Architecture for Multiple Users", Proceedings of the Korean Information Science Society Conference Vol. 38, No. 1, pp. 252-255, Jun, 2011
13 Taeshik Shon, Jongsub Moon, "A hybrid machine learning approach to network anomaly detection", Information Sciences Journals Vol. 177, Issue. 18, pp. 3799-3821, Sep. 2007   DOI
14 Jesus Mena, Machine Learning Forensics for Law Enforcement, Security and Intelligence, CRC Press, Aug. 2011
15 Steven Bird, Ewan Klein, Edward Loper, Natural Language Processing with Python, O'Reilly Media Inc, Jun. 2009
16 Andreas Muller, Sarah Guido, Introduction to Machine Learning with Python, O'Reilly Media Inc, May. 2016
17 Chinuk Lee, Kook Hyun Yoo, Byeong Min Mun, Suk Joo Bae "Informal Quality Data Analysis via Sentimental analysis and Word2vec method", Journal of the Korean society for quality management Vol. 45, No. 1, pp. 117-128, Mar. 2017   DOI
18 Dharmaraj R. Patil, Jayantrao B. Patil, "Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification", The ISC International Journal of Information Security Vol. 10, No. 2, pp. 141-162, Jul. 2018