A Clustering-Based Method for Intrusion Detection in Web Servers

被引:0
作者
Pereira, Hermano [1 ]
Jamhour, Edgard [1 ]
机构
[1] Pontifical Catholic Univ Parana PUCPR, PPGIA, Curitiba, Parana, Brazil
来源
2013 20TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT) | 2013年
关键词
Intrusion detection; security; clustering; anomaly-based detection;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Today, intrusion detection systems (IDS) are indispensable to protect environments that provide information via Internet. In the present trend of self-organizing and self-protecting system, a special type of IDS that operates by non-supervised learning is an interesting approach. This type of IDS is able to extract models of behavior of the environment without the need of prior knowledge about attacks or signatures. One of the techniques used to create such models is data clustering, where patterns of data access are collected and grouped to create IDS rules. In this paper we focus on the development of a non-supervised IDS for protecting Web servers from attacks using malicious HTTP access patterns. We propose a heuristic method for assigning labels to groups considering simultaneously the source and the content of the HTTP requests. The proposed method is completely self-organized, and does not require configuration or signature updates to prepare the IDS to detect new forms of attacks. Our evaluation shows that the proposed method yield fewer false positive alerts when compared to similar non-supervised methods in the literature.
引用
收藏
页数:5
相关论文
共 17 条
[1]  
[Anonymous], 2005, P 28 AUSTR CS C
[2]  
[Anonymous], 2002, ADV INF SECUR
[3]  
Bolzoni D, 2008, LECT NOTES COMPUT SC, V5332, P938
[4]  
Corona I, 2010, JMLR WORKSH CONF PRO, V11, P160
[5]  
Criscione C., 2009, P EUR C COMP NETW DE, P37
[6]  
DARPA, 1998, DARP INTR DET EV DAT
[7]  
Fawcett Tom., 2004, ROC Graphs: Notes and Practical Considerations for Researchers
[8]  
Guan Y, 2003, CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS, P1083
[9]   Learning DFA representations of HTTP for protecting web applications [J].
Ingham, Kenneth L. ;
Somayaji, Anil ;
Burge, John ;
Forrest, Stephanie .
COMPUTER NETWORKS, 2007, 51 (05) :1239-1255
[10]  
Kruegel Christopher., 2003, P 10 ACM C COMPUTER, P251, DOI 10.1145/948109.948144