Securing the Web: A Survey of Web Intrusion Detection Methods

Authors

  • Shraddha Solanki
  • Divya Solanki
  • Ashish Tiwari

Keywords:

Anomaly detection, Artificial intelligence, Intrusion Detection Systems (IDS), Machine learning, Web intrusion

Abstract

As the reliance on web-based applications and services continues to proliferate, the threats posed by malicious intrusions into these systems have become a paramount concern. This review paper explores the realm of web intrusion detection, providing a comprehensive overview of the state-of-the-art techniques, methodologies, and advancements in the field. Subsequently, the paper categorizes and examines various web intrusion detection approaches, ranging from signature-based methods to anomaly detection and machine learning-based techniques. Each approach’s strengths, limitations, and real-world applications are scrutinized to offer a well-rounded understanding of the current landscape. The paper delves into the evolution of intrusion detection systems, taking into account the dynamic nature of web attacks and the shifting attack vectors. It evaluates the role of big data analytics, artificial intelligence, and machine learning in enhancing the efficiency and accuracy of intrusion detection.

References

Positive Technologies, “Web applications vulnerabilities and threats: Statistics for 2019,” Positive Technologies, Feb. 13, 2020, Available: https://global.ptsecurity.com/en/research/

analytics/web-vulnerabilities-2020/

M. Noman, M. Iqbal, M. Manzoor, “A survey on detection and prevention of web vulnerabilities,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 6, 2020, Available: https://thesai.org/Publications/ViewPaper?Volume=11&Issue=6&

Code=IJACSA&SerialNo=65

OWASP, “OWASP application security verification standard,” OWASP, 2024, Available: https://owasp.org/www-project-application-security-verification-standard/

SAMMS, “OWASP software assurance maturity model,” SAMMS, 2022, Available: https://owasp.org/www-project-samm/

N. Jovanovic, C. Kruegel and E. Kirda, “Pixy: A static analysis tool for detecting Web application vulnerabilities,” 2006 IEEE Symposium on Security and Privacy (S&P'06), Berkeley/Oakland, CA, USA, 2006, doi: https://doi.org/10.1109/SP.2006.29

I. Medeiros, N. Neves and M. Correia, “Detecting and removing web application vulnerabilities with static analysis and data mining,” in IEEE Transactions on Reliability, vol. 65, no. 1, pp. 54–69, Mar. 2016, doi: https://doi.org/10.1109/TR.2015.2457411

Z. Wang, Y. Zeng, Y. Liu and D. Li, “Deep belief network integrating improved Kernel-based extreme learning machine for network intrusion detection,” in IEEE Access, vol. 9, pp. 16062–16091, 2021, doi: https://doi.org/10.1109/ACCESS.2021.3051074

G. Abdelmoumin, D. B. Rawat and A. Rahman, “On the performance of machine learning models for anomaly-based intelligent intrusion detection systems for the Internet of Things,” in IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4280–4290, Mar., 2022, doi: https://doi.org/10.1109/JIOT.2021.3103829

S. Otoum, B. Kantarci and H. T. Mouftah, “On the feasibility of deep learning in sensor network intrusion detection,” in IEEE Networking Letters, vol. 1, no. 2, pp. 68–71, Jun. 2019, doi: https://doi.org/10.1109/LNET.2019.2901792

G. De Carvalho Bertoli et al., “An end-to-end framework for machine learning-based network intrusion detection system,” in IEEE Access, vol. 9, pp. 106790–106805, 2021, doi: https://doi.org/10.1109/ACCESS.2021.3101188

N. Tran, H. Chen, J. Bhuyan and J. Ding, “Data curation and quality evaluation for machine learning-based cyber intrusion detection,” in IEEE Access, vol. 10, pp. 121900–121923, 2022, doi: https://doi.org/10.1109/ACCESS.2022.3211313

S. M. H. Mirsadeghi, H. Bahsi, R. Vaarandi and W. Inoubli, “Learning from few cyber-attacks: Addressing the class imbalance problem in machine learning-based intrusion detection in software-defined networking,” in IEEE Access, vol. 11, pp. 140428–140442, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3341755

S. Pitafi, T. Anwar, I. D. M. Widia and B. Yimwadsana, “Revolutionizing perimeter intrusion detection: A machine learning-driven approach with curated dataset generation for enhanced security,” in IEEE Access, vol. 11, pp. 106954–106966, 2023, https://doi.org/10.1109/ACCESS.2023.3318600

B. Gao, B. Bu, W. Zhang and X. Li, “An intrusion detection method based on machine learning and state observer for train-ground communication systems,” in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 6608–6620, Jul. 2022, doi: https://doi.org/10.1109/TITS.2021.3058553

Z. Azam, M. M. Islam and M. N. Huda, “Comparative analysis of intrusion detection systems and machine learning-based model analysis through decision tree,” in IEEE Access, vol. 11, pp. 80348–80391, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3296444

L. Zou, X. Luo, Y. Zhang, X. Yang and X. Wang, “HC-DTTSVM: A network intrusion detection method based on decision tree twin support vector machine and hierarchical clustering,” in IEEE Access, vol. 11, pp. 21404–21416, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3251354

L. Le Jeune, T. Goedemé and N. Mentens, “Machine learning for misuse-based network intrusion detection: Overview, unified evaluation and feature choice comparison framework,” in IEEE Access, vol. 9, pp. 63995–64015, 2021, doi: https://doi.org/10.1109/ACCESS.2021.3075066

P. L. S. Jayalaxmi, R. Saha, G. Kumar, M. Conti and T. -H. Kim, “Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey,” in IEEE Access, vol. 10, pp. 121173–121192, 2022, doi: https://doi.org/10.1109/ACCESS.2022.3220622

J. Lansky et al., “Deep learning-based intrusion detection systems: A systematic review,” in IEEE Access, vol. 9, pp. 101574–101599, 2021, doi: https://doi.org/10.1109/ACCESS.2021.3097247

G. Apruzzese, L. Pajola, and M. Conti, “The cross-evaluation of machine learning-based network intrusion detection systems” arXiv, Mar. 2022, doi: https://doi.org/10.48550/arXiv.2203.04686

E. Tufan, C. Tezcan and C. Acartürk, “Anomaly-based intrusion detection by machine learning: A case study on probing attacks to an institutional network,” in IEEE Access, vol. 9, pp. 50078–50092, 2021, doi: https://doi.org/10.1109/ACCESS.2021.3068961

F. Al-Quayed, Z. Ahmad and M. Humayun, “A situation based predictive approach for cybersecurity intrusion detection and prevention using machine learning and deep learning algorithms in wireless sensor networks of Industry 4.0,” in IEEE Access, vol. 12, pp. 34800–34819, 2024, doi: https://doi.org/10.1109/ACCESS.2024.3372187

T. J. Lucas et al., “A comprehensive survey on ensemble learning-based intrusion detection approaches in computer networks,” in IEEE Access, vol. 11, pp. 122638–122676, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3328535

M. A. Ferrag, L. Shu, O. Friha and X. Yang, “Cyber security intrusion detection for Agriculture 4.0: Machine learning-based solutions, datasets, and future directions,” in IEEE/CAA Journal of Automatica Sinica, vol. 9, no. 3, pp. 407–436, Mar. 2022, doi: https://doi.org/10.1109/JAS.2021.1004344

A. Jamalipour and S. Murali, “A taxonomy of machine-learning-based intrusion detection systems for the Internet of Things: A Survey,” in IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9444–9466, Jun. 2022, doi: https://doi.org/10.1109/JIOT.2021.3126811

X. Gao, C. Shan, C. Hu, Z. Niu and Z. Liu, “An adaptive ensemble machine learning model for intrusion detection,” in IEEE Access, vol. 7, pp. 82512–82521, 2019, doi: https://doi.org/10.1109/ACCESS.2019.2923640

M. N. Injadat, A. Moubayed, A. B. Nassif, and A. Shami, “Multi-stage optimized machine learning framework for network intrusion detection” arXiv, Aug. 2020, doi: https://doi.org/10.48550/arXiv.2008.03297

R. Fu, X. Ren, Y. Li, Y. Wu, H. Sun and M. A. Al-Absi, “Machine-learning-based UAV-assisted agricultural information security architecture and intrusion detection,” in IEEE Internet of Things Journal, vol. 10, no. 21, pp. 18589–18598, Nov. 2023, doi: https://doi.org/10.1109/JIOT.2023.3236322

Published

2025-12-26

How to Cite

Shraddha Solanki, Divya Solanki, & Ashish Tiwari. (2025). Securing the Web: A Survey of Web Intrusion Detection Methods. Journal of Web Development and Web Designing, 10(3), 44–55. Retrieved from https://matjournals.net/engineering/index.php/JoWDWD/article/view/2917

Issue

Section

Articles