Comparing anomaly detection techniques for HTTP

被引:0
|
作者
Ingham, Kenneth L. [1 ]
Inoue, Hajime [2 ]
机构
[1] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
[2] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
基金
美国国家科学基金会;
关键词
anomaly detection; intrusion detection; comparison; HTTP; Hypertext transport protocol;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Much data access occurs via HTTP, which is becoming a universal transport protocol. Because of this, it has become a common exploit target and several HTTP specific IDSs have been proposed as a response. However, each IDS is developed and tested independently, and direct comparisons are difficult. We describe a framework for testing IDS algorithms, and apply it to several proposed anomaly detection algorithms, testing using identical data and test environment. The results show serious limitations in all approaches, and we make predictions about requirements for successful anomaly detection approaches used to protect web servers.
引用
收藏
页码:42 / +
页数:4
相关论文
共 50 条
  • [31] Manifold learning techniques for unsupervised anomaly detection
    Olson, C. C.
    Judd, K. P.
    Nichols, J. M.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2018, 91 : 374 - 385
  • [32] A Novel HTTP Anomaly Detection Framework Based on Edge Intelligence for the Internet of Things (IoT)
    An, Yufei
    Li, Jianqiang
    Yu, F. Richard
    Chen, Jianyong
    Leung, Victor C. M.
    [J]. IEEE WIRELESS COMMUNICATIONS, 2021, 28 (02) : 159 - 165
  • [33] Edge Intelligence (EI)-Enabled HTTP Anomaly Detection Framework for the Internet of Things (IoT)
    An, Yufei
    Yu, F. Richard
    Li, Jianqiang
    Chen, Jianyong
    Leung, Victor C. M.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) : 3554 - 3566
  • [34] Analysis of Anomaly Detection Techniques in Video Surveillance
    Ovhal, Karuna B.
    Patange, Sonal S.
    Shinde, Reshma S.
    Tarange, Vaishnavi K.
    Kotkar, Vijay A.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 596 - 601
  • [35] A Heuristic for an Online Applicability of Anomaly Detection Techniques
    Al-Falouji, Ghassan
    Gruhl, Christian
    Neumann, Torben
    Tomforde, Sven
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS COMPANION (ACSOS-C 2022), 2022, : 107 - 112
  • [36] Techniques and Systems for Anomaly Detection in Database Systems
    Sallam, Asmaa
    Bertino, Elisa
    [J]. POLICY-BASED AUTONOMIC DATA GOVERNANCE (PADG 2018), 2019, 11550 : 113 - 133
  • [37] BIFAD: Bio-Inspired Anomaly Based HTTP-Flood Attack Detection
    K. Munivara Prasad
    A. Rama Mohan Reddy
    K. Venugopal Rao
    [J]. Wireless Personal Communications, 2017, 97 : 281 - 308
  • [38] Promising Techniques for Anomaly Detection on Network Traffic
    Tian, Hui
    Liu, Jingtian
    Ding, Meimei
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2017, 14 (03) : 597 - 609
  • [39] Sequential Anomaly Detection Techniques in Business Processes
    Linn, Christian
    Werth, Dirk
    [J]. BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2016, 2017, 263 : 196 - 208
  • [40] A survey of anomaly detection techniques in financial domain
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Islam, Md. Rafiqul
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 278 - 288