Improving Web Application Firewalls through Anomaly Detection

  • Gustavo Betarte
  • , Eduardo Gimenez
  • , Rodrigo Martinez
  • , Alvaro Pardo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

27 Scopus citations

Abstract

Web applications are permanently being exposed to attacks that exploit their vulnerabilities. In this work we investigate the application of machine learning techniques to leverage Web Application Firewalls (WAF)s, a technology that is used to detect and prevent attacks. We put forward an approach of complementary machine learning models, based on one-class classification and n-gram analysis, to enhance the detection and accuracy capabilities of MODSECURITY, an open source and widely used WAF. The results are promising and outperform MODSECURITY when configured with the OWASP Core Rule Set, the baseline configuration setting of a widely deployed, rule-based WAF technology.

Original languageEnglish
Title of host publicationProceedings - 17th IEEE International Conference on Machine Learning and Applications, ICMLA 2018
EditorsM. Arif Wani, Mehmed Kantardzic, Moamar Sayed-Mouchaweh, Joao Gama, Edwin Lughofer
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages779-784
Number of pages6
ISBN (Electronic)9781538668047
DOIs
StatePublished - 2 Jul 2018
Event17th IEEE International Conference on Machine Learning and Applications, ICMLA 2018 - Orlando, United States
Duration: 17 Dec 201820 Dec 2018

Publication series

NameProceedings - 17th IEEE International Conference on Machine Learning and Applications, ICMLA 2018

Conference

Conference17th IEEE International Conference on Machine Learning and Applications, ICMLA 2018
Country/TerritoryUnited States
CityOrlando
Period17/12/1820/12/18

Keywords

  • Anomaly Detection
  • Machine Learning
  • N-gram Analysis
  • One-class Classification
  • Web Application Firewalls

Fingerprint

Dive into the research topics of 'Improving Web Application Firewalls through Anomaly Detection'. Together they form a unique fingerprint.

Cite this