Comparing anomaly detection techniques for HTTP

被引:0
|
作者
Ingham, Kenneth L. [1 ]
Inoue, Hajime [2 ]
机构
[1] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
[2] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
基金
美国国家科学基金会;
关键词
anomaly detection; intrusion detection; comparison; HTTP; Hypertext transport protocol;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Much data access occurs via HTTP, which is becoming a universal transport protocol. Because of this, it has become a common exploit target and several HTTP specific IDSs have been proposed as a response. However, each IDS is developed and tested independently, and direct comparisons are difficult. We describe a framework for testing IDS algorithms, and apply it to several proposed anomaly detection algorithms, testing using identical data and test environment. The results show serious limitations in all approaches, and we make predictions about requirements for successful anomaly detection approaches used to protect web servers.
引用
收藏
页码:42 / +
页数:4
相关论文
共 50 条
  • [1] Online anomaly detection using dimensionality reduction techniques for HTTP log analysis
    Juvonen, Antti
    Sipola, Tuomo
    Hamalainen, Timo
    [J]. COMPUTER NETWORKS, 2015, 91 : 46 - 56
  • [2] A Hybrid Approach of HTTP Anomaly Detection
    Shi, Yang
    Wang, Shupei
    Zhao, Qinpei
    Li, Jiangfeng
    [J]. WEB AND BIG DATA, 2017, 10612 : 128 - 137
  • [3] Anomaly Detection for HTTP Using Convolutional Autoencoders
    Park, Seungyoung
    Kim, Myungjin
    Lee, Seokwoo
    [J]. IEEE ACCESS, 2018, 6 : 70884 - 70901
  • [4] An HTTP Anomaly Detection Architecture Based on the Internet of Intelligence
    An, Yufei
    He, Ying
    Yu, F. Richard
    Li, Jianqiang
    Chen, Jianyong
    Leung, Victor C. M.
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (03) : 1552 - 1565
  • [5] Patterns Extraction Method for Anomaly Detection in HTTP Traffic
    Kozik, Rafal
    Choras, Michal
    Renk, Rafal
    Holubowicz, Witold
    [J]. INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 227 - 236
  • [6] Analysis of HTTP requests for anomaly detection of web attacks
    Zolotukhin, Mikhail
    Hamalainen, Timo
    Kokkonen, Tero
    Siltanen, Jarmo
    [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 406 - +
  • [7] A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges
    Diaz-Verdejo, Jesus E.
    Estepa Alonso, Rafael
    Estepa Alonso, Antonio
    Madinabeitia, German
    [J]. COMPUTERS & SECURITY, 2023, 124
  • [8] Using Anomaly Detection Based Techniques to Detect HTTP-based Botnet C&C Traffic
    Sakib, Muhammad N.
    Huang, Chin-Tser
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [9] Web Servers Protection Using Anomaly Detection for HTTP Requests
    Satmarean, Paul
    Oprisa, Ciprian
    [J]. COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 77 - 90
  • [10] RPAD: An Unsupervised HTTP Request Parameter Anomaly Detection Method
    Sun, Yizhen
    Xie, Yiman
    Wang, Weiping
    Zhang, Shigeng
    Wu, Yuxi
    Feng, Jingchuan
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1216 - 1222