Data publikacji: 22 wrz 2022
Zakres stron: 25 - 41
Otrzymano: 11 gru 2021
Przyjęty: 29 gru 2021
DOI: https://doi.org/10.2478/bipie-2021-0020
Słowa kluczowe
© 2021 Cătălin Mironeanu et al., published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Designing a security solution should rely on having a good knowledge of the protected assets and better develop active responses rather than focus on reactive ones. We argue and prove that malicious activities such as vulnerabilities exploitation and (D)DoS on Web applications can be detected during their respective initial phases. While they may seem distinct, both attack scenarios are observable through abnormal access patterns. Following on this remark, we first analyze Web access logs using association rule mining techniques and identify these malicious traces. This new description of the historical data is then correlated with Web site structure information and mapped over