Detecting Application-layer Attacks Based on User's Application-layer Behaviors

被引:0
|
作者
Xie, Bailin [1 ]
Jiang, Shengyi [1 ]
机构
[1] Guangdong Univ Foreign Studies, Cisco Sch Informat, Guangzhou, Guangdong, Peoples R China
关键词
Application-layer; User's behaviors; Anomaly detection; Protocols' keywords; Hidden semi-Markov model;
D O I
10.4028/www.scientific.net/AMM.411-414.607
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
This paper presents an application-layer attack detection method based on user's application-layer behaviors. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-Markov model is used to describe the application-layer behaviors of a normal user who is using the application-layer protocol. This method is also based anomaly detection. In theory, application-layer anomaly detection can identify the known, unknown and novel attacks happened on application-layer. The experimental results show that this method can identify several application-layer attacks, and has high detection accuracy and low false positive ratio.
引用
收藏
页码:607 / 612
页数:6
相关论文
共 50 条
  • [21] Application-Layer Redundancy for the EVS Codec
    Majed, Najmeddine
    Ragot, Stephane
    Gros, Laetitia
    Lagrange, Xavier
    Blanc, Alberto
    2018 26TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2018, : 2090 - 2094
  • [22] An efficient algorithm for application-layer anycasting
    Yu, S
    Zhou, WL
    Huang, FC
    Lan, MJ
    DISTRIBUTED COMMUNITIES ON THE WEB, 2002, 2468 : 74 - 83
  • [23] Altruism driven application-layer multicast
    Wang, Miao
    Peng, Ge
    Zhang, Yujun
    Li, Guojie
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (05): : 729 - 735
  • [24] Application-Layer Intrusion Detection in MANETs
    Chang, Katharine
    Shin, Kang G.
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 2800 - 2809
  • [25] A lightweight application-layer signaling protocol
    Kitamura, Tsutomu
    Shizuno, Takayuki
    Okabe, Toshiya
    Tani, Hideaki
    2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 448 - 452
  • [26] Application-layer multicast with Delaunay triangulations
    Liebeherr, J
    Nahas, M
    GLOBECOM '01: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2001, : 1651 - 1655
  • [27] Loss recovery in application-layer multicast
    Jin, Xing
    Yiu, W. -P. Ken
    Chan, S. -H. Gary
    IEEE MULTIMEDIA, 2008, 15 (01) : 18 - 27
  • [28] A SURVEY OF APPLICATION-LAYER MULTICAST PROTOCOLS
    Hosseini, Mojtaba
    Ahmed, Dewan Tanvir
    Shirmohammadi, Shervin
    Georganas, Nicolas D.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2007, 9 (03): : 58 - 74
  • [29] Application-layer mobility using SIP
    Schulzrinne, H
    Wedlund, E
    2000 IEEE SERVICE PORTABILITY AND VIRTUAL CUSTOMER ENVIRONMENTS, 2001, : 29 - 36
  • [30] On the stability of application-layer multicast tree
    Xu, Ke
    Liu, Jiangchuan
    Fu, Lizheng
    Liu, Chunyu
    Computer and Information Sciences - ISCIS 2006, Proceedings, 2006, 4263 : 401 - 412