Measuring normality in HTTP traffic for anomaly-based intrusion detection

نویسندگان

  • Juan E. Tapiador
  • Pedro García-Teodoro
  • Jesús E. Díaz-Verdejo
چکیده

In this paper, the problem of measuring normality in HTTP traffic for the purpose of anomaly-based network intrusion detection is addressed. The work carried out is expressed in two steps: first, some statistical analysis of both normal and hostile traffic is presented. The experimental results of this study reveal that certain features extracted from HTTP requests can be used to distinguish anomalous (and, therefore, suspicious) traffic from that corresponding to correct, normal connections. The second part of the paper presents a new anomaly-based approach to detect attacks carried out over HTTP traffic. The technique introduced is statistical and makes use of Markov chains to model HTTP network traffic. The incoming HTTP traffic is parameterised for evaluation on a packet payload basis. Thus, the payload of each HTTP request is segmented into a certain number of contiguous blocks, which are subsequently quantized according to a previously trained scalar codebook. Finally, the temporal sequence of the symbols obtained is evaluated by means of a Markov model derived during a training phase. The detection results provided by our approach show important improvements, both in detection ratio and regarding false alarms, in comparison with those obtained using other current techniques. 2004 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Time Series Data Mining Based on ARMA and MLFNN Model for Intrusion Detection

This paper investigates the issue on how to effectively model time series with a new algorithm given by a Multilayer Feedforward Neural Network (MLFNN) and an Autoregressive Moving Average (ARMA). The static nonlinear part is modeled by MLFNN, and the linear part is modeled by an ARMA model. The algorithm is developed for estimating the weights of the MLFNN and the parameters of ARMA model. To ...

متن کامل

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

Analysis and Design of Effective Methods for Anomaly-based Intrusion Detection

Anomaly-based intrusion detection is about discerning intrusive and normal patterns of activities based on the normality characterization of information systems. The common goal of anomaly-based intrusion detection is to detect intrusive attacks as many as possible with fewer false alerts. Generally, our work is to study effective models, methods and techniques for anomaly-based intrusion detec...

متن کامل

Intrusion Detection System for Multitier Web Based Application

Computing Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web services have moved to a multitier design wherein the web server runs the application front-end logic and data are outsourced to a database or file server...

متن کامل

Adaptive Observation-Centric Anomaly-Based Intrusion Detection: Modeling, Analysis and Evaluation

Anomaly-based intrusion detection is about discrimination of malicious and legitimate patterns of activities (system or user-driven) in variables characterizing system normality. Due to the nonstationarity and increasingly complexity of today’s computer systems, perfect normality characterization is always deemed to be an unreachable goal for any anomaly detection model. Because of the same rea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Networks

دوره 45  شماره 

صفحات  -

تاریخ انتشار 2004