Downloads
Abstract
With the growth and expansion of the internet, web attacks have become more powerful and pose a significant threat in the cyber world. In response to this, this paper presents a deceptive approach for gathering malicious behavior to understand the strategies used by web attackers. The harmful requests collected through cyber traps or honeypots are analyzed and used to train machine learning (ML) models for web attack detection. Additionally, we implement an ML operations (MLOps) pipeline to automate the continuous training and deployment of these ML models in defensive systems. This pipeline trains the production model with newly collected data by using predefined triggers. Our experiments on two datasets, including Fwaf and our own, demonstrate that a proactive and continuous approach to tracking adversary behavior can effectively detect zero-day attacks, such as CVE-2022-26134 in web application servers.
Issue: Vol 26 No 2 (2023)
Page No.: 2729-2740
Published: Jun 30, 2023
Section: Section: NATURAL SCIENCES
DOI: https://doi.org/10.32508/stdj.v26i2.4044
PDF = 571 times
Total = 571 times