Application-layer Anomaly Detection Based on Application-layer Protocols' Keywords

被引:0
|
作者
Xie, Bailin [1 ]
Zhang, Qiansheng [1 ]
机构
[1] Guangdong Univ Foreign Studies, Cisco Sch Informat, Guangzhou, Guangdong, Peoples R China
关键词
application-layer; anomaly detection; protocols' keywords; hidden semi-Markov model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays most network-based attacks are based on application-layer protocols and don't present significant difference in network traffic. Observed from the network-layer and transport-layer, these attacks may not contain significant malicious activities, and generate abnormal network traffic. So it is difficult for existing methods to effectively detect such application-layer attacks without special techniques. In theory, application-layer anomaly detection can detect the known, unknown and novel attacks happened on application-layer, therefore the research of application-layer anomaly detection is very important. This paper presents an application-layer anomaly detection method based on application-layer protocols' keywords. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-Markov model is used to describe the behaviors of a normal user who is using the application-layer protocol. The experimental results show that this method has high detection accuracy and low false positive ratio.
引用
收藏
页码:2131 / 2135
页数:5
相关论文
共 50 条
  • [31] Application-layer multicast in MANETs: To broadcast or not to broadcast?
    Baumung, Peter
    2008 FIFTH ANNUAL CONFERENCE ON WIRELESS ON DEMAND NETWORK SYSTEMS AND SERVICES, 2008, : 133 - 140
  • [32] SAMP: Scalable application-layer mobility protocol
    Pack, S
    Park, K
    Kwon, T
    Choi, Y
    IEEE COMMUNICATIONS MAGAZINE, 2006, 44 (06) : 86 - 92
  • [33] Dynamic application-layer protocol analysis for network intrusion detection
    Dreger, Holger
    Feldmann, Anja
    Mai, Michael
    Paxson, Vern
    Sommer, Robin
    USENIX Association Proceedings of the 15th USENIX Security Symposium, 2006, : 257 - 272
  • [34] Application-Layer Protocol for Collaborative Multimedia Presentations
    Eenjun Hwang
    B. Prabhakaran
    Multimedia Tools and Applications, 2003, 21 : 103 - 123
  • [35] Considerations for application-layer multipath transport control
    Zhang, Wei
    Lei, Weimin
    Guan, Yunchong
    Li, Guangye
    Yang, Lei
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (17)
  • [36] Application-layer multicasting with Delaunay triangulation overlays
    Liebeherr, J
    Nahas, M
    Si, WS
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2002, 20 (08) : 1472 - 1488
  • [37] DataRouter: A network-layer service for application-layer forwarding
    Touch, JD
    Pingali, VK
    ACTIVE NETWORKS, 2003, 2982 : 115 - 126
  • [38] An application-layer based centralized information access control for VPN
    欧阳凯
    周敬利
    夏涛
    余胜生
    Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2006, (02) : 240 - 249
  • [39] Scalable Application-Layer Multicast Simulations with OverSim
    Krause, Stephan
    Huebsch, Christian
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 314 - 318
  • [40] Application-layer group communication server for extending reliable multicast protocols services
    AlShaer, E
    AbdelWahab, H
    Maly, K
    1997 INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS, 1997, : 267 - 274