Detecting Application-layer Attacks Based on User's Application-layer Behaviors

被引:0
|
作者
Xie, Bailin [1 ]
Jiang, Shengyi [1 ]
机构
[1] Guangdong Univ Foreign Studies, Cisco Sch Informat, Guangzhou, Guangdong, Peoples R China
关键词
Application-layer; User's behaviors; Anomaly detection; Protocols' keywords; Hidden semi-Markov model;
D O I
10.4028/www.scientific.net/AMM.411-414.607
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
This paper presents an application-layer attack detection method based on user's application-layer behaviors. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-Markov model is used to describe the application-layer behaviors of a normal user who is using the application-layer protocol. This method is also based anomaly detection. In theory, application-layer anomaly detection can identify the known, unknown and novel attacks happened on application-layer. The experimental results show that this method can identify several application-layer attacks, and has high detection accuracy and low false positive ratio.
引用
收藏
页码:607 / 612
页数:6
相关论文
共 50 条
  • [21] An approach to application-layer DoS detection
    Cliff Kemp
    Chad Calvert
    Taghi M. Khoshgoftaar
    Joffrey L. Leevy
    [J]. Journal of Big Data, 10
  • [22] An efficient algorithm for application-layer anycasting
    Yu, S
    Zhou, WL
    Huang, FC
    Lan, MJ
    [J]. DISTRIBUTED COMMUNITIES ON THE WEB, 2002, 2468 : 74 - 83
  • [23] Loss recovery in application-layer multicast
    Jin, Xing
    Yiu, W. -P. Ken
    Chan, S. -H. Gary
    [J]. IEEE MULTIMEDIA, 2008, 15 (01) : 18 - 27
  • [24] A lightweight application-layer signaling protocol
    Kitamura, Tsutomu
    Shizuno, Takayuki
    Okabe, Toshiya
    Tani, Hideaki
    [J]. 2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 448 - 452
  • [25] Application-layer multicast with Delaunay triangulations
    Liebeherr, J
    Nahas, M
    [J]. GLOBECOM '01: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2001, : 1651 - 1655
  • [26] Altruism driven application-layer multicast
    Wang, Miao
    Peng, Ge
    Zhang, Yujun
    Li, Guojie
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (05): : 729 - 735
  • [27] Application-Layer Intrusion Detection in MANETs
    Chang, Katharine
    Shin, Kang G.
    [J]. 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 2800 - 2809
  • [28] Application-layer mobility using SIP
    Schulzrinne, H
    Wedlund, E
    [J]. 2000 IEEE SERVICE PORTABILITY AND VIRTUAL CUSTOMER ENVIRONMENTS, 2001, : 29 - 36
  • [29] A SURVEY OF APPLICATION-LAYER MULTICAST PROTOCOLS
    Hosseini, Mojtaba
    Ahmed, Dewan Tanvir
    Shirmohammadi, Shervin
    Georganas, Nicolas D.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2007, 9 (03): : 58 - 74
  • [30] An Overlay Application-Layer Multicast Infrastructure
    Uchoa, Daniel C.
    Kopp, Samuel
    Pimentel, Helcio M.
    Matushima, Reinaldo
    Silveira, Regina M.
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 233 - 240