Cargando…

Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks †

New techniques and tactics are being used to gain unauthorized access to the web that harm, steal, and destroy information. Protecting the system from many threats such as DDoS, SQL injection, cross-site scripting, etc., is always a challenging issue. This research work makes a comparative analysis...

Descripción completa

Detalles Bibliográficos
Autores principales: Dawadi, Babu R., Adhikari, Bibek, Srivastava, Devesh K.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9965318/
https://www.ncbi.nlm.nih.gov/pubmed/36850675
http://dx.doi.org/10.3390/s23042073
_version_ 1784896733068656640
author Dawadi, Babu R.
Adhikari, Bibek
Srivastava, Devesh K.
author_facet Dawadi, Babu R.
Adhikari, Bibek
Srivastava, Devesh K.
author_sort Dawadi, Babu R.
collection PubMed
description New techniques and tactics are being used to gain unauthorized access to the web that harm, steal, and destroy information. Protecting the system from many threats such as DDoS, SQL injection, cross-site scripting, etc., is always a challenging issue. This research work makes a comparative analysis between normal HTTP traffic and attack traffic that identifies attack-indicating parameters and features. Different features of standard datasets ISCX, CISC, and CICDDoS were analyzed and attack and normal traffic were compared by taking different parameters into consideration. A layered architecture model for DDoS, XSS, and SQL injection attack detection was developed using a dataset collected from the simulation environment. In the long short-term memory (LSTM)-based layered architecture, the first layer was the DDoS detection model designed with an accuracy of 97.57% and the second was the XSS and SQL injection layer with an obtained accuracy of 89.34%. The higher rate of HTTP traffic was investigated first and filtered out, and then passed to the second layer. The web application firewall (WAF) adds an extra layer of security to the web application by providing application-level filtering that cannot be achieved by the traditional network firewall system.
format Online
Article
Text
id pubmed-9965318
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-99653182023-02-26 Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks † Dawadi, Babu R. Adhikari, Bibek Srivastava, Devesh K. Sensors (Basel) Article New techniques and tactics are being used to gain unauthorized access to the web that harm, steal, and destroy information. Protecting the system from many threats such as DDoS, SQL injection, cross-site scripting, etc., is always a challenging issue. This research work makes a comparative analysis between normal HTTP traffic and attack traffic that identifies attack-indicating parameters and features. Different features of standard datasets ISCX, CISC, and CICDDoS were analyzed and attack and normal traffic were compared by taking different parameters into consideration. A layered architecture model for DDoS, XSS, and SQL injection attack detection was developed using a dataset collected from the simulation environment. In the long short-term memory (LSTM)-based layered architecture, the first layer was the DDoS detection model designed with an accuracy of 97.57% and the second was the XSS and SQL injection layer with an obtained accuracy of 89.34%. The higher rate of HTTP traffic was investigated first and filtered out, and then passed to the second layer. The web application firewall (WAF) adds an extra layer of security to the web application by providing application-level filtering that cannot be achieved by the traditional network firewall system. MDPI 2023-02-12 /pmc/articles/PMC9965318/ /pubmed/36850675 http://dx.doi.org/10.3390/s23042073 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Dawadi, Babu R.
Adhikari, Bibek
Srivastava, Devesh K.
Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks †
title Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks †
title_full Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks †
title_fullStr Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks †
title_full_unstemmed Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks †
title_short Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks †
title_sort deep learning technique-enabled web application firewall for the detection of web attacks †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9965318/
https://www.ncbi.nlm.nih.gov/pubmed/36850675
http://dx.doi.org/10.3390/s23042073
work_keys_str_mv AT dawadibabur deeplearningtechniqueenabledwebapplicationfirewallforthedetectionofwebattacks
AT adhikaribibek deeplearningtechniqueenabledwebapplicationfirewallforthedetectionofwebattacks
AT srivastavadeveshk deeplearningtechniqueenabledwebapplicationfirewallforthedetectionofwebattacks