Research Article Open Access

A Survey of Anomaly Detection Using Data Mining Methods for Hypertext Transfer Protocol Web Services

Mohsen Kakavand1, Norwati Mustapha1, Aida Mustapha1, Mohd Taufik Abdullah1 and Hamed Riahi2
  • 1 University Putra Malaysia, Malaysia
  • 2 , Malaysia


In contrast to traditional Intrusion Detection Systems (IDSs), data mining anomaly detection methods/techniques has been widely used in the domain of network traffic data for intrusion detection and cyber threat. Data mining is widely recognized as popular and important intelligent and automatic tools to assist humans in big data security analysis and anomaly detection over IDSs. In this study we discuss our review in data mining anomaly detection methods for HTTP web services. Today, many online careers and actions including online shopping and banking are running through web-services. Consequently, the role of Hypertext Transfer Protocol (HTTP) in web services is crucial, since it is the standard facilitator for communication protocol. Hence, among the intruders that bound attacks, HTTP is being considered as a vital middle objective. In the recent years, an effective system that has attracted the attention of the researchers is the anomaly detection which is based on data mining methods. We provided an overview on four general data mining techniques such as classification, clustering, semi-supervised and association rule mining. These data mining anomaly detection methods can be used to computing intelligent HTTP request data, which are necessary in describing user behavior. To meet the challenges of data mining techniques, we provide challenges and issues section for intrusion detection systems in HTTP web services.

Journal of Computer Science
Volume 11 No. 1, 2015, 89-97


Submitted On: 26 April 2014 Published On: 22 January 2015

How to Cite: Kakavand, M., Mustapha, N., Mustapha, A., Abdullah, M. T. & Riahi, H. (2015). A Survey of Anomaly Detection Using Data Mining Methods for Hypertext Transfer Protocol Web Services. Journal of Computer Science, 11(1), 89-97.

  • 5 Citations



  • Data Mining
  • Intrusion Detection Systems
  • Anomaly Detection
  • Hypertext Transfer Protocol (HTTP)
  • Web Services