Application-layer Anomaly Detection Based on Application-layer Protocols' Keywords

被引:0
|
作者
Xie, Bailin [1 ]
Zhang, Qiansheng [1 ]
机构
[1] Guangdong Univ Foreign Studies, Cisco Sch Informat, Guangzhou, Guangdong, Peoples R China
关键词
application-layer; anomaly detection; protocols' keywords; hidden semi-Markov model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays most network-based attacks are based on application-layer protocols and don't present significant difference in network traffic. Observed from the network-layer and transport-layer, these attacks may not contain significant malicious activities, and generate abnormal network traffic. So it is difficult for existing methods to effectively detect such application-layer attacks without special techniques. In theory, application-layer anomaly detection can detect the known, unknown and novel attacks happened on application-layer, therefore the research of application-layer anomaly detection is very important. This paper presents an application-layer anomaly detection method based on application-layer protocols' keywords. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-Markov model is used to describe the behaviors of a normal user who is using the application-layer protocol. The experimental results show that this method has high detection accuracy and low false positive ratio.
引用
下载
收藏
页码:2131 / 2135
页数:5
相关论文
共 50 条
  • [1] A SURVEY OF APPLICATION-LAYER MULTICAST PROTOCOLS
    Hosseini, Mojtaba
    Ahmed, Dewan Tanvir
    Shirmohammadi, Shervin
    Georganas, Nicolas D.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2007, 9 (03): : 58 - 74
  • [2] Detecting Application-layer Attacks Based on User's Application-layer Behaviors
    Xie, Bailin
    Jiang, Shengyi
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 607 - 612
  • [3] An approach to application-layer DoS detection
    Kemp, Cliff
    Calvert, Chad
    Khoshgoftaar, Taghi M.
    Leevy, Joffrey L.
    JOURNAL OF BIG DATA, 2023, 10 (01)
  • [4] An approach to application-layer DoS detection
    Cliff Kemp
    Chad Calvert
    Taghi M. Khoshgoftaar
    Joffrey L. Leevy
    Journal of Big Data, 10
  • [5] Application-Layer Intrusion Detection in MANETs
    Chang, Katharine
    Shin, Kang G.
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 2800 - 2809
  • [6] Application-layer multicast
    Katrinis, K
    May, M
    PEER-TO-PEER SYSTEMS AND APPLICATIONS, 2005, 3485 : 157 - 170
  • [7] Detection of Application-Layer DDoS by Clustering Algorithm
    She, Chuyu
    Wen, Wushao
    Lin, Zaihua
    Zheng, Kesong
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 102 - 104
  • [8] On effectiveness of application-layer coding
    Choi, Yoojin
    Momcilovic, Petar
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 433 - 441
  • [9] A State-Aware Protocol Fuzzer Based on Application-Layer Protocols
    Kitagawa, Takahisa
    Hanaoka, Miyuki
    Kono, Kenji
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (05) : 1008 - 1017
  • [10] Application-Layer Connector Synthesis
    Inverardi, Paola
    Spalazzese, Romina
    Tivoli, Massimo
    FORMAL METHODS FOR ETERNAL NETWORKED SOFTWARE SYSTEMS, SFM 2011, 2011, 6659 : 148 - 190