ering superior results across diverse datasets.
Table 4: Results of the Experiments (Top two results of each
metric are bolded, precedence of MASD is certain).
Method Metric Banking CSIC2010 WAF
MASD
with RF
(Proposed)
Accuracy 0.9583 0.9667 0.9917
Recall 0.9583 0.9667 0.9917
Precision 0.9594 0.9662 0.9917
F1 Score 0.9587 0.9660 0.9916
SVM
Accuracy 0.8333 0.8333 0.8333
Recall 0.8333 0.8333 0.8333
Precision 0.6944 0.6944 0.6944
F1 Score 0.7576 0.7576 0.7576
Na
¨
ıve
Bayes
Accuracy 0.8417 0.7833 0.6583
Recall 0.8417 0.7833 0.6583
Precision 0.9188 0.8933 0.8880
F1 Score 0.8589 0.8092 0.7008
CNN
Accuracy 0.8333 0.8333 0.8417
Recall 0.8333 0.8383 0.8417
Precision 0.6944 0.6944 0.8669
F1 Score 0.7576 0.7576 0.7769
Decision
Tree
Accuracy 0.9083 0.8917 0.9750
Recall 0.9083 0.8917 0.9750
Precision 0.9409 0.9343 0.9783
F1 Score 0.9156 0.9012 0.9757
DBSCAN
Accuracy 0.7000 0.7417 0.7500
Recall 0.7000 0.7417 0.7500
Precision 0.7901 0.8521 0.8241
F1 Score 0.7317 0.7720 0.7748
SOM
Accuracy 0.9167 0.9417 0.9833
Recall 0.9167 0.9417 0.9833
Precision 0.9133 0.9455 0.9837
F1 Score 0.9105 0.9365 0.9830
8 CONCLUSIONS
In the realm of web session security, this paper repre-
sents a significant stride forward by presenting a ma-
chine learning-grounded solution for the detection of
malicious web sessions. The study introduces a novel
classifier-driven methodology that capitalizes on the
potency of machine learning algorithms to discern
and classify malicious web sessions. This approach
is applied across three distinct datasets, underscoring
its versatility and potential effectiveness. Notably, the
approach stands out by achieving a remarkable ac-
curacy rate, dispelling the need for the often restric-
tive feature extraction phase that typically extracts a
limited array of features. The recorded results strik-
ingly surpass the 99% mark across all assessed met-
rics. These outcomes collectively highlight the poten-
tial efficacy of the machine learning-based classifier
approach in fortifying web session security. Further-
more, the groundwork laid by this research paves the
way for future extensions, possibly encompassing the
classification of diverse user sessions and a deeper ex-
ploration of user behavior patterns.
REFERENCES
Ahmad, F. (2017). WAF malicious queries data sets. [On-
line]. Available: https://web.archive.org/web/2023
0301151428/https://github.com/faizann24/Fwaf-Ma
chine-Learning-driven-Web-Application-Firewall/.
(Accessed on 01 March 2023).
Azab, A., Khasawneh, M., Alrabaee, S., Choo, K.-K. R.,
and Sarsour, M. (2022). Network traffic classification:
Techniques, datasets, and challenges. Digital Commu-
nications and Networks.
Cortes, C. and Vapnik, V. (1995). Support-vector networks.
Machine learning, 20:273–297.
Gim
´
enez, C. T., Villegas, A. P., and Mara
˜
n
´
on, G.
´
A. (2012).
Information Security Institute, HTTP DATASET
CSIC 2010. [Online]. Available: https://www.tic.itef
i.csic.es/dataset/. (Accessed on 18 December 2014).
Goseva-Popstojanova, K., Anastasovski, G., and Pantev,
R. (2012). Classification of malicious Web sessions.
In 2012 21st International Conference on Computer
Communications and Networks (ICCCN), pages 1–9.
IEEE.
Guti
´
errez, M. G.-C., Pongilupi, J. V., and LLin
`
as, M. M.
(2010). Web sessions anomaly detection in dynamic
environments. In ISSE 2009 Securing Electronic Busi-
ness Processes: Highlights of the Information Secu-
rity Solutions Europe 2009 Conference, pages 216–
220. Springer.
Jemal, I., Haddar, M. A., Cheikhrouhou, O., and Mah-
foudhi, A. (2020). Malicious HTTP request detection
using code-level convolutional neural network. In In-
ternational Conference on Risks and Security of Inter-
net and Systems, pages 317–324. Springer.
Lewis, D. D. (1998). Naive (Bayes) at forty: The indepen-
dence assumption in information retrieval. In Machine
Learning: ECML-98: 10th European Conference on
Machine Learning Chemnitz, Germany, April 21–23,
1998 Proceedings 10, pages 4–15. Springer.
Mansfield-Devine, S. (2022). Verizon: Data Breach Inves-
tigations Report.
PurpleSec (2022). Cyber Security Statistics: The Ultimate
List Of Stats Data, & Trends For 2022. [Online].
Available: https://web.archive.org/web/20221205
155455/https://purplesec.us/resources/cyber-securit
y-statistics/. (Accessed on 5 December 2022).
Sadeghpour, S., Vlajic, N., Madani, P., and Stevanovic, D.
(2021). Unsupervised ML Based Detection of Ma-
licious Web Sessions with Automated Feature Selec-
tion: Design and Real-World Validation. In 2021
IEEE 18th Annual Consumer Communications & Net-
working Conference (CCNC), pages 1–9. IEEE.
Stevanovic, D., Vlajic, N., and An, A. (2011). Unsuper-
vised clustering of Web sessions to detect malicious
NCTA 2023 - 15th International Conference on Neural Computation Theory and Applications
494