Anomaly Detection in HTTP Logs: Leveraging Machine Learning for Uncovering Anomalous Traffic Patterns with SIEM Integration
Anomaly Detection in HTTP Logs: Leveraging Machine Learning for Uncovering Anomalous Traffic Patterns with SIEM Integration
Waqas Ahmad,Muhammad Faisal Amjad
TLDR
A framework for detecting anomalies in Hypertext Transfer Protocol (HTTP) logs, enabling fast detection of anomalies, visualization of network traffic, and integration with SIEM solutions is proposed.
Abstract
Network traffic continuously rises, and network services become increasingly more complex and vulnerable. Intrusion detection systems are employed to safeguard these networks. Signature-based intrusion detection cannot detect new attacks, so anomaly detection is necessary. Also, most of the traditional security information and event management (SIEM) doesn't have any live dataset creation or anomalous data log detection. In this paper, we propose a framework for detecting anomalies in Hypertext Transfer Protocol (HTTP) logs, enabling fast detection of anomalies, visualization of network traffic, and integration with SIEM solutions. This solution gets HTTP logs from the network and preprocesses them. Then, the solution checks the traffic for anomaly detection by applying the Isolation Forest algorithm using unsupervised learning. Later, we will then explore those anomalies with clustering using the K-means method. The proposed solution uses no predefined dataset file. But, it trains on the live data logs, where the user checks for any anomalous data logs within a given timestamp. The logs from this specified timestamp serve as the dataset for the model's training. The solutions are on live network HTTP logs, but in this paper, we are using this solution on a test network where we have 153 logs, of which 32 are declared anomalous by our proposed solution and after that the clustering on those anomalous data logs were applied. Finally, the results are sent to the SIEM solution, which visualizes the network and the anomalous traffic. Besides this, the solution is quick to detect intrusion attempts. This method is significant in the sense, that because it contributes to proactive cybersecurity strategies specifically designed to meet the requirements of Security Operations Center (SOC) analysts and threat-hunting teams.
