Affiliation:
1. Faculty of Informatics and Information Technologies, Slovak University of Technology in Bratislava, 842 16 Bratislava, Slovakia
Abstract
In this study, we present a novel machine learning framework for web server anomaly detection that uniquely combines the Isolation Forest algorithm with expert evaluation, focusing on individual user activities within NGINX server logs. Our approach addresses the limitations of traditional methods by effectively isolating and analyzing subtle anomalies in vast datasets. Initially, the Isolation Forest algorithm was applied to extensive NGINX server logs, successfully identifying outlier user behaviors that conventional methods often overlook. We then employed DBSCAN for detailed clustering of these anomalies, categorizing them based on user request times and types. A key innovation of our methodology is the incorporation of post-clustering expert analysis. Cybersecurity professionals evaluated the identified clusters, adding a crucial layer of qualitative assessment. This enabled the accurate distinction between benign and potentially harmful activities, leading to targeted responses such as access restrictions or web server configuration adjustments. Our approach demonstrates a significant advancement in network security, offering a more refined understanding of user behavior. By integrating algorithmic precision with expert insights, we provide a comprehensive and nuanced strategy for enhancing cybersecurity measures. This study not only advances anomaly detection techniques but also emphasizes the critical need for a multifaceted approach in protecting web server infrastructures.
Funder
European Regional Development Fund
Reference22 articles.
1. Benova, L., and Hudec, L. (2023, January 11–13). Using Web Server Logs to Identify and Comprehend Anomalous User Activity. Proceedings of the 2023 17th International Conference on Telecommunications (ConTEL), Graz, Austria.
2. Network anomaly detection: Methods, systems and tools;Bhuyan;IEEE Commun. Surv. Tutorials,2013
3. (2024, January 16). Acunetix, Acunetix Web Application Vulnerability Report 2016. Available online: https://www.acunetix.com/acunetix-web-application-vulnerability-report-2016/.
4. A survey of deep learning-based network anomaly detection;Kwon;Clust. Comput.,2019
5. Yu, J., Tao, D., and Lin, Z. (2016, January 17–19). A hybrid web log based intrusion detection model. Proceedings of the 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS), Beijing, China.