Measuring normality in HTTP traffic for anomaly-based intrusion detection

被引:26
|
作者
Estévez-Tapiador, JM [1 ]
García-Teodoro, P [1 ]
Díaz-Verdejo, JE [1 ]
机构
[1] Univ Granada, Dept Elect & Comp Technol, E-18071 Granada, Spain
关键词
anomaly detection; application-level intrusion detection; HTTP attacks; computer and network security;
D O I
10.1016/j.comnet.2003.12.016
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the problem of measuring normality in HTTP traffic for the purpose of anomaly-based network intrusion detection is addressed. The work carried out is expressed in two steps: first, some statistical analysis of both normal and hostile traffic is presented. The experimental results of this study reveal that certain features extracted from HTTP requests can be used to distinguish anomalous (and, therefore, suspicious) traffic from that corresponding to correct, normal connections. The second part of the paper presents a new anomaly-based approach to detect attacks carried out over HTTP traffic. The technique introduced is statistical and makes use of Markov chains to model HTTP network traffic. The incoming HTTP traffic is parameterised for evaluation on a packet payload basis. Thus, the payload of each HTTP request is segmented into a certain number of contiguous blocks, which are subsequently quantized according to a previously trained scalar codebook. Finally, the temporal sequence of the symbols obtained is evaluated by means of a Markov model derived during a training phase. The detection results provided by our approach show important improvements, both in detection ratio and regarding false alarms, in comparison with those obtained using other current techniques. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:175 / 193
页数:19
相关论文
共 50 条
  • [41] Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S), 2020, : 81 - 81
  • [42] Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods
    Tavallaee, Mahbod
    Stakhanova, Natalia
    Ghorbani, Ali Akbar
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (05): : 516 - 524
  • [43] An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks
    Zachos, Georgios
    Essop, Ismael
    Mantas, Georgios
    Porfyrakis, Kyriakos
    Ribeiro, Jose C.
    Rodriguez, Jonathan
    ELECTRONICS, 2021, 10 (21)
  • [44] Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems
    Gillen, Robert E.
    Carter, Jason M.
    Craig, Christopher
    Johnson, Jordan A.
    Scott, Stephen L.
    2020 21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (IEEE WOWMOM 2020), 2020, : 360 - 366
  • [45] Anomaly-Based Intrusion Detection System Using Support Vector Machine
    Krishnaveni, S.
    Vigneshwar, Palani
    Kishore, S.
    Jothi, B.
    Sivamohan, S.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 723 - 731
  • [46] A brief observation-centric analysis on anomaly-based intrusion detection
    Zhang, ZH
    Shen, H
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 178 - 191
  • [47] Proposals on assessment environments for anomaly-based network intrusion detection systems
    Bermudez-Edo, M.
    Salazar-Hernandez, R.
    Diaz-Verdejo, J.
    Garcia-Teodoro, P.
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 210 - +
  • [48] Review on Feature Selection Algorithms for Anomaly-Based Intrusion Detection System
    Alamiedy, Taief Alaa
    Anbar, Mohammed
    Al-Ani, Ahmed K.
    Al-Tamimi, Bassam Naji
    Faleh, Nameer
    RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 605 - 619
  • [49] An efficient hybrid SVDD/Clustering approach for anomaly-based intrusion detection
    Kenaza, Tayeb
    Bennaceur, Khadidja
    Labed, Abdenour
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 435 - 443
  • [50] RAPID: Real-time Anomaly-based Preventive Intrusion Detection
    Doshi, Keval
    Mozaffari, Mahsa
    Yilmaz, Yasin
    PROCEEDINGS OF THE 2019 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING (WISEML '19), 2019, : 49 - 54