Performance Analysis of Different ML/DL algorithms for Detecting Web Attacks
Abstract
In the digital era, where web applications serve as
the backbone for numerous services, the security of
online systems has become a critical concern. Web
attacks such as SQL injection, cross-site scripting
(XSS), denial-of-service (DoS), and phishing have
become increasingly sophisticated, threatening the
integrity, confidentiality, and availability of webbased
platforms. Detecting these threats promptly
is crucial to minimizing damage and securing data.
Traditional security mechanisms like firewalls and
rule-based systems often struggle to detect novel or
obfuscated attacks, prompting the need for more
adaptive and intelligent detection techniques.
Machine Learning (ML) and Deep Learning (DL)
models have emerged as promising tools for
identifying patterns and anomalies within network
traffic and web application logs.
This project aims to perform a comparative
analysis of various ML and DL algorithms, such as
Support Vector Machine (SVM), Decision Trees,
Random Forests, Convolutional Neural Networks
(CNN), and Recurrent Neural Networks (RNN), to
evaluate their performance in detecting different
types of web attacks.
Downloads
References
Shone, N., Ngoc, T. N., Phai, V. D., &
Shi, Q. (2018). A deep learning
approach to network intrusion
detection. IEEE Transactions on
Emerging Topics in Computational
Intelligence, 2(1), 41-50.
2. Kim, Y., Kim, W., & Kim, H. K. (2020).
A novel hybrid intrusion detection
method integrating anomaly detection
with misuse detection. Expert Systems
with Applications, 186, 115002.
3. Moustafa, N., & Slay, J. (2015). UNSWNB15:
A comprehensive data set for
network intrusion detection systems
(UNSW-NB15 network data set).
Military Communications and Information
Systems Conference (MilCIS), IEEE.
4. Tavallaee, M., Bagheri, E., Lu, W., &
Ghorbani, A. A. (2009). A detailed
analysis of the KDD CUP 99 data set.
Proceedings of the IEEE Symposium on
Computational Intelligence for Security
and Defense Applications.
5. Yin, C., Zhu, Y., Fei, J., & He, X. (2017).
A deep learning approach for intrusion
detection using recurrent neural
networks. IEEE Access, 5, 21954–21961.
6. Vinayakumar, R., Soman, K. P., &
Poornachandran, P. (2017). Applying
convolutional neural network for
network intrusion detection.
Proceedings of the International
Conference on Advances in Computing,
Communications and Informatics
(ICACCI).
7. Dhanabal, L., & Shantharajah, S. P.
(2015). A study on NSL-KDD dataset
for intrusion detection system based on
classification algorithms. International
Journal of Advanced Research in
Computer and Communication
Engineering, 4(6), 446-452.
8. Javaid, A., Niyaz, Q., Sun, W., & Alam,
M. (2016). A deep learning approach for
network intrusion detection system.
Proceedings of the 9th EAI International
Conference on Bio-inspired Information
and Communications Technologies
(formerly BIONETICS).
9. Berman, D. S., Buczak, A. L., Chavis, J.
S., & Corbett, C. L. (2019). A survey of
deep learning methods for cyber
security. Information, 10(4), 122.
10. Alrawashdeh, K., & Purdy, C. (2016).
Toward an online anomaly intrusion
detection system based on deep
learning. IEEE International Conference
on Machine Learning and Applications
(ICMLA).
11. Ahmad, I., Basheri, M., Iqbal, M. J., &
Rahim, A. (2018). Performance
comparison of support vector machine,
random forest, and extreme learning
machine for intrusion detection. IEEE
Access, 6, 33789–33795.
12. Sharafaldin, I., Lashkari, A. H., &
Ghorbani, A. A. (2018). Toward
generating a new intrusion detection
dataset and intrusion traffic
characterization. ICISSP, 1, 108–116.
(CICIDS2017 Dataset)
13. Sommer, R., & Paxson, V. (2010).
Outside the closed world: On using
machine learning for network intrusion
detection. IEEE Symposium on Security
and Privacy (SP).
14. Kwon, D., Kim, J., & Kim, J. (2019).
Deep learning-based anomaly detection
system for discovering web attacks.
IEEE Access, 7, 183527–183536.
15. Goodfellow, I., Bengio, Y., & Courville,
A. (2016). Deep Learning. MIT Press.