Measuring normality in HTTP traffic for anomaly-based intrusion detection

被引:26
|
作者
Estévez-Tapiador, JM [1 ]
García-Teodoro, P [1 ]
Díaz-Verdejo, JE [1 ]
机构
[1] Univ Granada, Dept Elect & Comp Technol, E-18071 Granada, Spain
关键词
anomaly detection; application-level intrusion detection; HTTP attacks; computer and network security;
D O I
10.1016/j.comnet.2003.12.016
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the problem of measuring normality in HTTP traffic for the purpose of anomaly-based network intrusion detection is addressed. The work carried out is expressed in two steps: first, some statistical analysis of both normal and hostile traffic is presented. The experimental results of this study reveal that certain features extracted from HTTP requests can be used to distinguish anomalous (and, therefore, suspicious) traffic from that corresponding to correct, normal connections. The second part of the paper presents a new anomaly-based approach to detect attacks carried out over HTTP traffic. The technique introduced is statistical and makes use of Markov chains to model HTTP network traffic. The incoming HTTP traffic is parameterised for evaluation on a packet payload basis. Thus, the payload of each HTTP request is segmented into a certain number of contiguous blocks, which are subsequently quantized according to a previously trained scalar codebook. Finally, the temporal sequence of the symbols obtained is evaluated by means of a Markov model derived during a training phase. The detection results provided by our approach show important improvements, both in detection ratio and regarding false alarms, in comparison with those obtained using other current techniques. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:175 / 193
页数:19
相关论文
共 50 条
  • [21] Anomaly-based Intrusion Detection using Distributed intelligent systems
    Morel, Benoit
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 37 - 44
  • [22] An Initial Investigation on Sliding Windows for Anomaly-Based Intrusion Detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 99 - 104
  • [23] Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
    Ghafouri, Amin
    Abbas, Waseem
    Laszka, Aron
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 415 - 434
  • [24] Anomaly-Based Intrusion Detection for Detecting Blackhole Attack Mitigataion
    Abdelhamid, Ashraf
    Elsayed, Mahmoud Said
    Aslan, Heba K.
    Azer, Marianne A.
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [25] Learning Mechanisms for Anomaly-Based Intrusion Detection: Updated Review
    El-Alfy, El-Sayed M.
    Al-Utaibi, Khaled A.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1273 - 1281
  • [26] A Hybrid Model for Anomaly-based Intrusion Detection in SCADA Networks
    Ullah, Imtiaz
    Mahmoud, Qusay H.
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 2160 - 2167
  • [27] Anomaly-based intrusion detection using fuzzy rough clustering
    Chimphlee, Witcha
    Abdullah, Abdul Hanan
    Sap, Mohd Noor Md
    Srinoy, Surat
    Chimphlee, Siriporn
    2006 International Conference on Hybrid Information Technology, Vol 1, Proceedings, 2006, : 329 - 334
  • [28] Stream Learning and Anomaly-based Intrusion Detection in the Adversarial Settings
    Viegas, Eduardo
    Santin, Altair
    Abreu, Vilmar
    Oliveira, Luiz S.
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 773 - 778
  • [29] Anomaly-based intrusion detection: privacy concerns and other problems
    Lundin, E
    Jonsson, E
    COMPUTER NETWORKS, 2000, 34 (04) : 623 - 640
  • [30] Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems
    Nikolova, Evgeniya
    Jecheva, Veselina
    2015 8TH INTERNATIONAL CONFERENCE ON DATABASE THEORY AND APPLICATION (DTA), 2015, : 37 - 41