Understanding the Feature Space and Decision Boundaries of Commercial WAFs Using Maximum Entropy in the Mean
Abstract
:1. Introduction
2. Data Collection
- X: Traffic type, frequency of connections belonging to a: ’Benign’, ’Infilteration’, ’Bot’, ’Brute Force -Web’, ’Brute Force -XSS’, ’SQL Injection’, ’DoS attacks-GoldenEye’, ’DoS attacks-Slowloris’, ’DDoS attacks-LOIC-HTTP’, ’DDOS attack-HOIC’, ’DDOS attack-LOIC-UDP’, ’FTP-BruteForce’, ’SSH-Bruteforce’, ’DoS attacks-Hulk’, ’DoS attacks-SlowHTTPTest’. We shall label each of these 15 ports and from 1 to 15, respectively.
- Y: traffic behavior, frequency of port usage “0” “135” “137’ ’139” “21” “22” “3128” “3389” “443” “445” “53” “5355” “67” “80” “8080”. Those ports were selected since they represent more than 80% of web network traffic. We shall label each of these 15 ports from 1 to 15, respectively.
3. Statement of the Inverse Problem and Its Solution by MEM
4. Results
4.1. Simulation Exercise
4.2. Real Data Application
- ; ;
- ; ;
5. Discussion
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
Appendix A
The Vectorized Form of the Constraint Matrix
Scenario | Description |
---|---|
Brute-force attack | A set of agents attempts to connect via SSH or FTP to machines within the network by guessing the system’s password. |
Heartbleed attack | Heartbleed is a vulnerability found in the OpenSSL library, which allows an attacker to leak memory data from a system. Some vulnerable machines were added to the network and the heartleech program was used to exploit them. |
Botnet | Botnets are computers infected with malicious software and controlled as a group without the owners’ knowledge. Some computers within the network were infected with Zeus and other types of Trojans used to create botnets. |
Denial-of-Service (DoS) | This attack seeks to shut down a machine or network, making it inaccessible to its intended users. An agent was used to attack the systems within the network using the Slow Loris variant of this attack. |
Distributed Denial-of-Service (DDoS) | DDoS is a variant of the DoS attack, where multiple agents (usually a botnet) are used to overwhelm the target with a huge amount of requests. An agent was tasked to perform stress tests on the services and simulate a DDoS. |
Web Attacks | Web attacks aim to exploit vulnerable web applications (such as websites). Some computers within the network ran a vulnerable PHP/MySQL web application and an agent was used to automatically exploit the vulnerabilities. |
Infiltration of the network from inside | This scenario simulates the actions of an attacker who has gained control of one of the computers from within the network and uses Nmap to perform an IP sweep, full port scan, and service enumerations. |
References
- Matatall, N.; Arseniev, M. Web Application Security; University of California: Irvine, CA, USA, 2008. [Google Scholar]
- Prandl, S.; Lazarescu, M.; Pham, D.S. A study of web application firewall solutions. In Information Systems Security; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2015; pp. 501–510. [Google Scholar]
- Biggio, B.; Corona, I.; Maiorca, D.; Nelson, B.; Šrndić, N.; Laskov, P.; Giacinto, G.; Roli, F. Evasion attacks against machine learning at test time. In Advanced Information Systems Engineering; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2013; pp. 387–402. [Google Scholar]
- Papernot, N.; McDaniel, P.; Goodfellow, I.; Jha, S.; Celik, Z.B.; Swami, A. Practical Black-Box Attacks against Machine Learning. In Proceedings of the ACM Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, 2–6 April 2017; pp. 506–519. [Google Scholar] [CrossRef]
- Ahmad, Z.; Khan, A.S.; Shiang, C.W.; Abdullah, J.; Ahmad, F. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 2020, 32, e4150. [Google Scholar] [CrossRef]
- Kasongo, S.M.; Sun, Y. Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset. J. Big Data 2020, 7, 105. [Google Scholar] [CrossRef]
- Khammassi, C.; Krichen, S. A GA-LR wrapper approach for feature selection in network intrusion detection. Comput. Secur. 2017, 70, 255–277. [Google Scholar] [CrossRef]
- Jiang, K.; Wang, W.; Wang, A.; Wu, H. Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network. IEEE Access 2020, 8, 32464–32476. [Google Scholar] [CrossRef]
- Xu, X.; Rong, Z.; Tian, Z.; Wu, Z.X. Timescale diversity facilitates the emergence of cooperation-extortion alliances in networked systems. Neurocomputing 2019, 350, 195–201. [Google Scholar] [CrossRef]
- Gzyl, H. Construction of contingency tables by maximum entropy in the mean. Commun. Stat. Theory Methods 2021, 50, 4778–4786. [Google Scholar] [CrossRef]
- Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In Proceedings of the International Conference on Information Systems Security and Privacy, Funchal, Portugal, 22–24 January 2018. [Google Scholar]
- Rossow, C.; Dietrich, C.J.; Bos, H.; Cavallaro, L.; van Steen, M.; Freiling, F.C.; Pohlmann, N. Sandnet. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Salzburg, Austria, 10–13 April 2011. [Google Scholar]
- Mullen, K.; Ardia, D.; Gil, D.; Windover, D.; Cline, J. DEoptim: An R Package for Global Optimization by Differential Evolution. J. Stat. Softw. 2011, 40, 1–26. [Google Scholar] [CrossRef]
0.09 | 0.14 | 0.07 | |
0.07 | 0.23 | 0.16 | |
0.03 | 0.10 | 0.11 |
0.06 | 0.14 | 0.10 | |
0.09 | 0.21 | 0.16 | |
0.04 | 0.11 | 0.08 |
0.06 | 0.14 | 0.10 | |
0.09 | 0.21 | 0.16 | |
0.04 | 0.11 | 0.08 |
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | 1.77 × 10 | 1.69 × 10 | 1.93 × 10 | 1.57 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
2 | 9.14 × 10 | 1.93 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
3 | 1.70 × 10 | 2.00 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
4 | 2.21 × 10 | 6.77 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
5 | 3.93 × 10 | 2.63 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 1.45 × 10 | 2.25 × 10 | 0.00 | 1.05 × 10 |
6 | 6.88 × 10 | 7.05 × 10 | 0.00 | 7.51 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 1.40 × 10 | 0.00 | 0.00 |
7 | 2.10 × 10 | 2.10 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
8 | 1.36 × 10 | 1.02 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
9 | 1.50 × 10 | 2.19 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
10 | 5.30 × 10 | 4.10 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
11 | 3.02 × 10 | 3.78 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
12 | 3.80 × 10 | 8.49 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
13 | 1.00 × 10 | 8.64 × 10 | 0.00 | 1.50 × 10 | 7.51 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
14 | 1.27 × 10 | 4.37 × 10 | 0.00 | 3.45 × 10 | 1.69 × 10 | 6.53 × 10 | 3.11 × 10 | 8.25 × 10 | 4.32 × 10 | 5.15 × 10 | 1.30 × 10 | 0.00 | 0.00 | 3.47 × 10 | 0.00 |
15 | 4.33 × 10 | 2.70 × 10 | 2.11 × 10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gzyl, H.; ter Horst, E.; Peña-Garcia, N.; Torres, A. Understanding the Feature Space and Decision Boundaries of Commercial WAFs Using Maximum Entropy in the Mean. Entropy 2023, 25, 1476. https://doi.org/10.3390/e25111476
Gzyl H, ter Horst E, Peña-Garcia N, Torres A. Understanding the Feature Space and Decision Boundaries of Commercial WAFs Using Maximum Entropy in the Mean. Entropy. 2023; 25(11):1476. https://doi.org/10.3390/e25111476
Chicago/Turabian StyleGzyl, Henryk, Enrique ter Horst, Nathalie Peña-Garcia, and Andres Torres. 2023. "Understanding the Feature Space and Decision Boundaries of Commercial WAFs Using Maximum Entropy in the Mean" Entropy 25, no. 11: 1476. https://doi.org/10.3390/e25111476
APA StyleGzyl, H., ter Horst, E., Peña-Garcia, N., & Torres, A. (2023). Understanding the Feature Space and Decision Boundaries of Commercial WAFs Using Maximum Entropy in the Mean. Entropy, 25(11), 1476. https://doi.org/10.3390/e25111476