The research proposal aims to create a new dataset for web application intrusion detection by monitoring traffic to a vulnerable web application called DVWA using CICFlowMeter as various attacks are executed. The network traffic would be captured and mapped to timestamps to label the different attacks in the dataset. The cleaned dataset would then be used to test machine learning models for predicting web attacks and the findings would be published.
The research proposal aims to create a new dataset for web application intrusion detection by monitoring traffic to a vulnerable web application called DVWA using CICFlowMeter as various attacks are executed. The network traffic would be captured and mapped to timestamps to label the different attacks in the dataset. The cleaned dataset would then be used to test machine learning models for predicting web attacks and the findings would be published.
The research proposal aims to create a new dataset for web application intrusion detection by monitoring traffic to a vulnerable web application called DVWA using CICFlowMeter as various attacks are executed. The network traffic would be captured and mapped to timestamps to label the different attacks in the dataset. The cleaned dataset would then be used to test machine learning models for predicting web attacks and the findings would be published.
CREATING A DATASET FOR A WEB-APPLICATION AND USING ML TO
PREDICT WEB-ATTACKS Why
There are less, recent standard datasets for web
application based intrusion detection systems. Popular datasets used for this purpose are: CISC 2010, ECML, PKDD 2007, CICIDs Dataset(but data for web-based attacks are less). Potential vulenrabilities that can be evalualted: XSS, Bruteforcing, Fuzzing, SQL-Injection, etc. Proposed method
Using Damn Vulnerable Web Application(DVWA) as the
testing website Using CICFlowMeter to monitor the web traffic Running attacks such as XSS, Bruteforcing, Fuzzing, SQLi, File Uploads, CSRF, Command execution and so on.. Capturing the network traffic using CICFlowMeter and mapping the attacks according to timestamps. Cleaning the generated dataset. Running the ML models and publish the findings. Flow Chart Thank you!