Performance Analysis of Different ML/DL algorithms for Detecting Web Attacks

Authors

  • Dendukuri Lakshmi Harshitha PG scholar, Department of MCA, CDNR collage, Bhimavaram, Andhra Pradesh. Author
  • V.Sarala (Assistant Professor), Master of Computer Applications, DNR collage, Bhimavaram, Andhra Pradesh. Author

Abstract

In the digital era, where web applications serve as
the backbone for numerous services, the security of
online systems has become a critical concern. Web
attacks such as SQL injection, cross-site scripting
(XSS), denial-of-service (DoS), and phishing have
become increasingly sophisticated, threatening the
integrity, confidentiality, and availability of webbased
platforms. Detecting these threats promptly
is crucial to minimizing damage and securing data.
Traditional security mechanisms like firewalls and
rule-based systems often struggle to detect novel or
obfuscated attacks, prompting the need for more
adaptive and intelligent detection techniques.
Machine Learning (ML) and Deep Learning (DL)
models have emerged as promising tools for
identifying patterns and anomalies within network
traffic and web application logs.
This project aims to perform a comparative
analysis of various ML and DL algorithms, such as
Support Vector Machine (SVM), Decision Trees,
Random Forests, Convolutional Neural Networks
(CNN), and Recurrent Neural Networks (RNN), to
evaluate their performance in detecting different
types of web attacks.

Downloads

Download data is not yet available.

References

Shone, N., Ngoc, T. N., Phai, V. D., &

Shi, Q. (2018). A deep learning

approach to network intrusion

detection. IEEE Transactions on

Emerging Topics in Computational

Intelligence, 2(1), 41-50.

2. Kim, Y., Kim, W., & Kim, H. K. (2020).

A novel hybrid intrusion detection

method integrating anomaly detection

with misuse detection. Expert Systems

with Applications, 186, 115002.

3. Moustafa, N., & Slay, J. (2015). UNSWNB15:

A comprehensive data set for

network intrusion detection systems

(UNSW-NB15 network data set).

Military Communications and Information

Systems Conference (MilCIS), IEEE.

4. Tavallaee, M., Bagheri, E., Lu, W., &

Ghorbani, A. A. (2009). A detailed

analysis of the KDD CUP 99 data set.

Proceedings of the IEEE Symposium on

Computational Intelligence for Security

and Defense Applications.

5. Yin, C., Zhu, Y., Fei, J., & He, X. (2017).

A deep learning approach for intrusion

detection using recurrent neural

networks. IEEE Access, 5, 21954–21961.

6. Vinayakumar, R., Soman, K. P., &

Poornachandran, P. (2017). Applying

convolutional neural network for

network intrusion detection.

Proceedings of the International

Conference on Advances in Computing,

Communications and Informatics

(ICACCI).

7. Dhanabal, L., & Shantharajah, S. P.

(2015). A study on NSL-KDD dataset

for intrusion detection system based on

classification algorithms. International

Journal of Advanced Research in

Computer and Communication

Engineering, 4(6), 446-452.

8. Javaid, A., Niyaz, Q., Sun, W., & Alam,

M. (2016). A deep learning approach for

network intrusion detection system.

Proceedings of the 9th EAI International

Conference on Bio-inspired Information

and Communications Technologies

(formerly BIONETICS).

9. Berman, D. S., Buczak, A. L., Chavis, J.

S., & Corbett, C. L. (2019). A survey of

deep learning methods for cyber

security. Information, 10(4), 122.

10. Alrawashdeh, K., & Purdy, C. (2016).

Toward an online anomaly intrusion

detection system based on deep

learning. IEEE International Conference

on Machine Learning and Applications

(ICMLA).

11. Ahmad, I., Basheri, M., Iqbal, M. J., &

Rahim, A. (2018). Performance

comparison of support vector machine,

random forest, and extreme learning

machine for intrusion detection. IEEE

Access, 6, 33789–33795.

12. Sharafaldin, I., Lashkari, A. H., &

Ghorbani, A. A. (2018). Toward

generating a new intrusion detection

dataset and intrusion traffic

characterization. ICISSP, 1, 108–116.

(CICIDS2017 Dataset)

13. Sommer, R., & Paxson, V. (2010).

Outside the closed world: On using

machine learning for network intrusion

detection. IEEE Symposium on Security

and Privacy (SP).

14. Kwon, D., Kim, J., & Kim, J. (2019).

Deep learning-based anomaly detection

system for discovering web attacks.

IEEE Access, 7, 183527–183536.

15. Goodfellow, I., Bengio, Y., & Courville,

A. (2016). Deep Learning. MIT Press.

Downloads

Published

2025-05-01

Issue

Section

Articles

How to Cite

Performance Analysis of Different ML/DL algorithms for Detecting Web Attacks. (2025). International Journal of Multidisciplinary Engineering In Current Research, 10(5), 225-229. https://ijmec.com/index.php/multidisciplinary/article/view/645

Most read articles by the same author(s)