Application-layer Anomaly Detection Based on Application-layer Protocols' Keywords

被引:0
作者
Xie, Bailin [1 ]
Zhang, Qiansheng [1 ]
机构
[1] Guangdong Univ Foreign Studies, Cisco Sch Informat, Guangzhou, Guangdong, Peoples R China
来源
PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012) | 2012年
关键词
application-layer; anomaly detection; protocols' keywords; hidden semi-Markov model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays most network-based attacks are based on application-layer protocols and don't present significant difference in network traffic. Observed from the network-layer and transport-layer, these attacks may not contain significant malicious activities, and generate abnormal network traffic. So it is difficult for existing methods to effectively detect such application-layer attacks without special techniques. In theory, application-layer anomaly detection can detect the known, unknown and novel attacks happened on application-layer, therefore the research of application-layer anomaly detection is very important. This paper presents an application-layer anomaly detection method based on application-layer protocols' keywords. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-Markov model is used to describe the behaviors of a normal user who is using the application-layer protocol. The experimental results show that this method has high detection accuracy and low false positive ratio.
引用
收藏
页码:2131 / 2135
页数:5
相关论文
共 11 条
  • [1] Alazab Mamoun, 2011, P 9 AUSTR DAT MIN C, P171
  • [2] Hakem B, 2012, PROCEDIA COMPUTER SC, V10, P432
  • [3] A multi-model approach to the detection of web-based attacks
    Kruegel, C
    Vigna, G
    Robertson, W
    [J]. COMPUTER NETWORKS, 2005, 48 (05) : 717 - 738
  • [4] Kruegel Christopher., 2003, P 10 ACM C COMPUTER, P251, DOI 10.1145/948109.948144
  • [5] Mahoney MatthewV., 2002, P 8 INT C KNOWLEDGE, P376
  • [6] Mahoney MV, 2003, LECT NOTES COMPUT SC, V2820, P220
  • [7] McPAD: A multiple classifier system for accurate payload-based anomaly detection
    Perdisci, Roberto
    Ariu, Davide
    Fogla, Prahlad
    Giacinto, Giorgio
    Lee, Wenke
    [J]. COMPUTER NETWORKS, 2009, 53 (06) : 864 - 881
  • [8] A TUTORIAL ON HIDDEN MARKOV-MODELS AND SELECTED APPLICATIONS IN SPEECH RECOGNITION
    RABINER, LR
    [J]. PROCEEDINGS OF THE IEEE, 1989, 77 (02) : 257 - 286
  • [9] Wang K, 2004, LECT NOTES COMPUT SC, V3224, P203
  • [10] Hidden semi-Markov models
    Yu, Shun-Zheng
    [J]. ARTIFICIAL INTELLIGENCE, 2010, 174 (02) : 215 - 243