A Clustering-Based Method for Intrusion Detection in Web Servers

被引:0
|
作者
Pereira, Hermano [1 ]
Jamhour, Edgard [1 ]
机构
[1] Pontifical Catholic Univ Parana PUCPR, PPGIA, Curitiba, Parana, Brazil
关键词
Intrusion detection; security; clustering; anomaly-based detection;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Today, intrusion detection systems (IDS) are indispensable to protect environments that provide information via Internet. In the present trend of self-organizing and self-protecting system, a special type of IDS that operates by non-supervised learning is an interesting approach. This type of IDS is able to extract models of behavior of the environment without the need of prior knowledge about attacks or signatures. One of the techniques used to create such models is data clustering, where patterns of data access are collected and grouped to create IDS rules. In this paper we focus on the development of a non-supervised IDS for protecting Web servers from attacks using malicious HTTP access patterns. We propose a heuristic method for assigning labels to groups considering simultaneously the source and the content of the HTTP requests. The proposed method is completely self-organized, and does not require configuration or signature updates to prepare the IDS to detect new forms of attacks. Our evaluation shows that the proposed method yield fewer false positive alerts when compared to similar non-supervised methods in the literature.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] An improved unsupervised clustering-based intrusion detection method
    Hai, YJ
    Wu, Y
    Wang, GY
    [J]. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 : 52 - 60
  • [2] CLUSTERING-BASED NETWORK INTRUSION DETECTION
    Zhong, Shi
    Khoshgoftaar, Taghi M.
    Seliya, Naeem
    [J]. INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2007, 14 (02) : 169 - 187
  • [3] Clustering-Based Network Intrusion Detection System
    Fan, Chun-I
    Lai, Yen-Lin
    Shie, Cheng-Han
    [J]. 2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [4] A clustering-based method for unsupervised intrusion detections
    Jiang, SY
    Song, XY
    Wang, H
    Han, JJ
    Li, QH
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (07) : 802 - 810
  • [5] A Mixed Unsupervised Clustering-based Intrusion Detection Model
    Zhang, Cuixiao
    Zhang, Guobing
    Sun, Shanshan
    [J]. THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 426 - 428
  • [7] A Clustering-Based Unsupervised Approach to Anomaly Intrusion Detection
    Nikolova, Evgeniya
    Jecheva, Veselina
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER, COMMUNICATION, CONTROL AND AUTOMATION, 2013, 68 : 202 - 205
  • [8] Clustering-Based Outlier Detection Method
    Jiang, Sheng-yi
    An, Qing-bo
    [J]. FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 2, PROCEEDINGS, 2008, : 429 - 433
  • [9] CID: a novel clustering-based database intrusion detection algorithm
    Keyvanpour, Mohamad Reza
    Barani Shirzad, Mehrnoush
    Mehmandoost, Samaneh
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) : 1601 - 1612
  • [10] COTS diversity based intrusion detection and application to web servers
    Totel, E
    Majorczyk, F
    Mé, L
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, 2006, 3858 : 43 - 62