Cyber Security of the Application Layer of Mission Critical Industrial Systems
In this paper we focus on proposing the effective methods of cyber protection of the application layer. We also discuss how this challenge is related to mission critical industrial and manufacturing systems. In this paper we propose two step HTTP request
- PDF / 536,291 Bytes
- 10 Pages / 439.37 x 666.142 pts Page_size
- 0 Downloads / 148 Views
Institute of Telecommunications and Computer Science, UTP University of Science and Technology in Bydgoszcz, Bydgoszcz, Poland [email protected] 2 Adam Mickiewicz University, UAM, Poznan, Poland [email protected]
Abstract. In this paper we focus on proposing the effective methods of cyber protection of the application layer. We also discuss how this challenge is related to mission critical industrial and manufacturing systems. In this paper we propose two step HTTP request analysis method that engages request segmentation, statistical analysis of the extracted content and machine learning on the imbalanced data. In this work, we particularly addressed the segmentation technique that allows us to divide the large dataset on smaller subsets and learn the classifiers in a significantly shorter time. In our experiments we evaluated several classifiers that are popular in data mining community. The results of our experiments are obtained on a benchmark CSIC’10 HTTP dataset. The proposed approach allows us to further improve the achieved results of protecting application layer in comparison to other benchmark approaches. Keywords: Cyber security · Anomaly detection · Pattern extraction Application layer attacks · Web application security
1
·
Introduction and Rationale
The problem of cyber security in the application layer is recently more severe and challenging. In fact, top-ranked network threats and attacks e.g. on the OWASP list are those targeting application layer (such as SQLIA and XSS [2]). There are many reasons for such situation such as programmers faults, software bugs but also large number of the new applications and services being launched every day, their uniqness, lack of security standards for web applications, rapid changes in scalability etc. Another key aspect is the lack of cyber security awareness within the users and very often users are those providing access and creating security holes being the weakest link in the security chain. On the other hand, the level of cyber security of operating systems and network protocols is constantly increasing. Therefore, for the attackers it is cheaper, easier and more effective to focus on attacks on the application layer. c IFIP International Federation for Information Processing 2016 Published by Springer International Publishing Switzerland 2016. All Rights Reserved K. Saeed and W. Homenda (Eds.): CISIM 2016, LNCS 9842, pp. 342–351, 2016. DOI: 10.1007/978-3-319-45378-1 31
Cyber Security of the Application Layer
343
In this paper we focus on the effective methods of anomaly detection in the application layer. We also discuss how cyber threats and attacks in the application layer are related to mission critical industrial and manufacturing systems. This paper is structured as follows. First, we discuss the cyber security aspects of mission critical industrial and manufacturing systems with the focus on the application layer. Later we provide an general overview of proposed method (Sect. 3). Then, the detailed description of request segmentation and feat
Data Loading...