Application-layer Anomaly Detection Based on Application-layer Protocols' Keywords

被引:0
|
作者
Xie, Bailin [1 ]
Zhang, Qiansheng [1 ]
机构
[1] Guangdong Univ Foreign Studies, Cisco Sch Informat, Guangzhou, Guangdong, Peoples R China
关键词
application-layer; anomaly detection; protocols' keywords; hidden semi-Markov model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays most network-based attacks are based on application-layer protocols and don't present significant difference in network traffic. Observed from the network-layer and transport-layer, these attacks may not contain significant malicious activities, and generate abnormal network traffic. So it is difficult for existing methods to effectively detect such application-layer attacks without special techniques. In theory, application-layer anomaly detection can detect the known, unknown and novel attacks happened on application-layer, therefore the research of application-layer anomaly detection is very important. This paper presents an application-layer anomaly detection method based on application-layer protocols' keywords. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-Markov model is used to describe the behaviors of a normal user who is using the application-layer protocol. The experimental results show that this method has high detection accuracy and low false positive ratio.
引用
下载
收藏
页码:2131 / 2135
页数:5
相关论文
共 50 条
  • [21] Loss recovery in application-layer multicast
    Jin, Xing
    Yiu, W. -P. Ken
    Chan, S. -H. Gary
    IEEE MULTIMEDIA, 2008, 15 (01) : 18 - 27
  • [22] Tackling Application-layer DDoS Attacks
    Beitollahi, Hakem
    Deconinck, Geert
    ANT 2012 AND MOBIWIS 2012, 2012, 10 : 432 - 441
  • [23] Application-layer mobility using SIP
    Schulzrinne, H
    Wedlund, E
    2000 IEEE SERVICE PORTABILITY AND VIRTUAL CUSTOMER ENVIRONMENTS, 2001, : 29 - 36
  • [24] On the stability of application-layer multicast tree
    Xu, Ke
    Liu, Jiangchuan
    Fu, Lizheng
    Liu, Chunyu
    Computer and Information Sciences - ISCIS 2006, Proceedings, 2006, 4263 : 401 - 412
  • [25] Lesson 192 application-layer protection
    Conry-Murray, Andrew
    Network Magazine, 2004, 19 (07): : 56 - 57
  • [26] An Overlay Application-Layer Multicast Infrastructure
    Uchoa, Daniel C.
    Kopp, Samuel
    Pimentel, Helcio M.
    Matushima, Reinaldo
    Silveira, Regina M.
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 233 - 240
  • [27] Analysis of Application-Layer Filtering Policies With Application to HTTP
    Basile, Cataldo
    Lioy, Antonio
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2015, 23 (01) : 28 - 41
  • [28] Flexible Tree-based Application-Layer Multicast
    Huebsch, Christian
    Waldhorst, Oliver P.
    2011 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON), 2011, : 159 - 164
  • [29] Application-Layer DDoS Detection by K-means Algorithm
    She, Chuyu
    Wen, Wushao
    Zheng, Kesong
    Lyu, Yayun
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 75 - 78
  • [30] On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways
    Rytilahti, Teemu
    Holz, Thorsten
    27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,