Visualizing web server attacks: patterns in PHPIDS logs

被引:5
作者
Alsaleh, Mansour [1 ]
Alarifi, Abdulrahman [1 ]
Alqahtani, Abdullah [2 ]
Al-Salman, AbdulMalik [2 ]
机构
[1] King Abdulaziz City Sci & Technol, Comp Res Inst, Riyadh, Saudi Arabia
[2] King Saud Univ, Dept Comp Sci, Riyadh, Saudi Arabia
关键词
security data visualization; log visualization; intrusion detection systems; network monitoring; web server attacks;
D O I
10.1002/sec.1147
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The prevalence and severity of application-layer vulnerabilities increase dramatically their corresponding attacks. In this paper, we present an extension to PHPIDS, an open source intrusion detection and prevention system for PHP-based web applications, to visualize its security log. Our usage of security data visualization is motivated by the fact that most security defense systems are mainly based on text-based logs for recording security-related events, which are difficult to analyze and correlate. The proposed extension analyzes PHPIDS logs, correlates these logs with the corresponding web server logs, and plots the security-related events. We use a set of tightly coupled visual representations of hypertext transfer protocol server requests containing known and suspicious malicious content, to provide system administrators and security analysts with fine-grained visual-based querying capabilities. We present multiple case studies to demonstrate the ability of our PHPIDS visualization extension to support security analysts with analytic reasoning and decision making in response to ongoing web server attacks. Experimenting the proposed PHPIDS visualization extension on real-world datasets shows promise for providing complementary information for effective situational awareness. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1991 / 2003
页数:13
相关论文
共 32 条
[1]   Visualizing network data for intrusion detection [J].
Abdullah, K ;
Lee, A ;
Conti, G ;
Copeland, JA .
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, :100-108
[2]  
Alshaikh Z, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, P295, DOI 10.1109/ISI.2013.6578847
[3]  
[Anonymous], 2003, INTRUSION DETECTION
[4]  
[Anonymous], UNDERSTANDING INTRUS
[5]  
[Anonymous], P 10 WORKSH VIS CYB
[6]  
Colombe J.B., 2004, P 2004 ACM WORKSHOP, P138, DOI DOI 10.1145/1029208.1029231
[7]  
Conti Greg., 2007, SECURITY DATA VISUAL
[8]  
Dastani M, 2002, J VISUAL LANG COMPUT, V13, P601, DOI [10.1006/jvlc.2002.0235, 10.1006/S1045-926X(02)00026-5]
[9]   Designing visualization capabilities for IDS challenges [J].
Erbacher, RF ;
Christensen, K ;
Sundberg, A .
IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, 2005, :121-127
[10]  
Heer J., 2005, CHI, P421, DOI 10.1145/1054972.1055031