Application-layer Anomaly Detection Based on Application-layer Protocols' Keywords

被引:0
作者
Xie, Bailin [1 ]
Zhang, Qiansheng [1 ]
机构
[1] Guangdong Univ Foreign Studies, Cisco Sch Informat, Guangzhou, Guangdong, Peoples R China
来源
PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012) | 2012年
关键词
application-layer; anomaly detection; protocols' keywords; hidden semi-Markov model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays most network-based attacks are based on application-layer protocols and don't present significant difference in network traffic. Observed from the network-layer and transport-layer, these attacks may not contain significant malicious activities, and generate abnormal network traffic. So it is difficult for existing methods to effectively detect such application-layer attacks without special techniques. In theory, application-layer anomaly detection can detect the known, unknown and novel attacks happened on application-layer, therefore the research of application-layer anomaly detection is very important. This paper presents an application-layer anomaly detection method based on application-layer protocols' keywords. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-Markov model is used to describe the behaviors of a normal user who is using the application-layer protocol. The experimental results show that this method has high detection accuracy and low false positive ratio.
引用
收藏
页码:2131 / 2135
页数:5
相关论文
共 11 条
[1]  
Alazab Mamoun, 2011, P 9 AUSTR DAT MIN C, P171
[2]  
Hakem B, 2012, PROCEDIA COMPUTER SC, V10, P432
[3]   A multi-model approach to the detection of web-based attacks [J].
Kruegel, C ;
Vigna, G ;
Robertson, W .
COMPUTER NETWORKS, 2005, 48 (05) :717-738
[4]  
Kruegel Christopher., 2003, P 10 ACM C COMPUTER, P251, DOI 10.1145/948109.948144
[5]  
Mahoney MatthewV., 2002, P 8 INT C KNOWLEDGE, P376
[6]  
Mahoney MV, 2003, LECT NOTES COMPUT SC, V2820, P220
[7]   McPAD: A multiple classifier system for accurate payload-based anomaly detection [J].
Perdisci, Roberto ;
Ariu, Davide ;
Fogla, Prahlad ;
Giacinto, Giorgio ;
Lee, Wenke .
COMPUTER NETWORKS, 2009, 53 (06) :864-881
[8]   A TUTORIAL ON HIDDEN MARKOV-MODELS AND SELECTED APPLICATIONS IN SPEECH RECOGNITION [J].
RABINER, LR .
PROCEEDINGS OF THE IEEE, 1989, 77 (02) :257-286
[9]  
Wang K, 2004, LECT NOTES COMPUT SC, V3224, P203
[10]   Hidden semi-Markov models [J].
Yu, Shun-Zheng .
ARTIFICIAL INTELLIGENCE, 2010, 174 (02) :215-243