Entropy-based analyzing anomaly WEB traffic

被引:2
|
作者
Nasseralfoghara, Mehrdad [1 ]
Hamidi, HamidReza [1 ]
机构
[1] Imam Khomeini Int Univ, Fac Engn, Qazvin, Iran
关键词
Information security; convert channel; timing channel; WEB; entropy; TIMING CHANNELS; COVERT CHANNEL; ROBUST;
D O I
10.3233/JHS-200642
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application nature of HTTP protocol allows the creation of a covert timing channel based on different features of this protocol (or different levels) that has not been addressed in previous research. In this article, the entropy-based detection method was designed and implemented. The attacker can adjust the amount of channel entropy by controlling measures such as changing the channel's level or creating noise on the channel to protect from the analyzer's detection. As a result, the entropy threshold is not always constant for detection. By comparing the entropy from different levels of the channel and the analyzer, we concluded that the analyzer must investigate traffic at all possible levels. We also illustrated that by making noise on a covert channel, its capacity would decrease, but as entropy increases, it would be harder to detect it.
引用
收藏
页码:255 / 266
页数:12
相关论文
共 50 条
  • [1] An Empirical Evaluation of Entropy-based Traffic Anomaly Detection
    Nychis, George
    Sekar, Vyas
    Andersen, David G.
    Kim, Hyong
    Zhang, Hui
    [J]. IMC'08: PROCEEDINGS OF THE 2008 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, 2008, : 151 - 156
  • [2] Entropy-Based Internet Traffic Anomaly Detection: A Case Study
    Berezinski, Przemyslaw
    Pawelec, Jozef
    Malowidzki, Marek
    Piotrowski, Rata'
    [J]. PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON DEPENDABILITY AND COMPLEX SYSTEMS DEPCOS-RELCOMEX, 2014, 286 : 47 - 58
  • [3] Entropy-based Network Traffic Anomaly Classification Method Resilient to Deception
    Ibrahim, Juma
    Gajin, Slavko
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2022, 19 (01) : 87 - 116
  • [4] ENTVis: A Visual Analytic Tool for Entropy-Based Network Traffic Anomaly Detection
    Zhou, Fangfang
    Huang, Wei
    Zhao, Ying
    Shi, Yang
    Liang, Xing
    Fan, Xiaoping
    [J]. IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2015, 35 (06) : 42 - 50
  • [5] Entropy-Based Anomaly Detection in a Network
    Ajay Shankar Shukla
    Rohit Maurya
    [J]. Wireless Personal Communications, 2018, 99 : 1487 - 1501
  • [6] Entropy-based Network Anomaly Detection
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 334 - 340
  • [7] Entropy-Based Anomaly Detection in a Network
    Shukla, Ajay Shankar
    Maurya, Rohit
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (04) : 1487 - 1501
  • [8] Entropy-based reduction of traffic data
    Pescape, Antonio
    [J]. IEEE COMMUNICATIONS LETTERS, 2007, 11 (02) : 191 - 193
  • [9] An Entropy-Based Network Anomaly Detection Method
    Berezinski, Przemyslaw
    Jasiul, Bartosz
    Szpyrka, Marcin
    [J]. ENTROPY, 2015, 17 (04) : 2367 - 2408
  • [10] Entropy-Based Anomaly Detection in Household Electricity Consumption
    Moure-Garrido, Marta
    Campo, Celeste
    Garcia-Rubio, Carlos
    [J]. ENERGIES, 2022, 15 (05)