Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques

作者: Mikhail Zolotukhin , Timo Hämäläinen

DOI: 10.1007/978-3-642-40316-3_33

关键词:

摘要: Nowadays HTTP servers and applications are some of the most popular targets for network attacks. In this research, we consider an algorithm intrusions detection based on simple clustering algorithms advanced processing requests which allows analysis all queries at once does not separate them by resource. The method proposed in case continuously updated web-applications require a set free attacks to build normal user behaviour model. is tested using logs acquired from large real-life web service and, as result, these detected, while number false alarms remains zero.

参考文章(21)
Tuomo Sipola, Antti Juvonen, Joel Lehtonen, Anomaly Detection from Network Logs Using Diffusion Maps artificial intelligence applications and innovations. pp. 172- 181 ,(2011) , 10.1007/978-3-642-23957-1_20
Mikhail Zolotukhin, Timo Hämäläinen, Antti Juvonen, Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks international conference on web information systems and technologies. pp. 281- 295 ,(2012) , 10.1007/978-3-642-36608-6_18
Hans-Peter Kriegel, Martin Ester, Jörg Sander, Xiaowei Xu, A density-based algorithm for discovering clusters in large spatial Databases with Noise knowledge discovery and data mining. pp. 226- 231 ,(1996)
A. K. Jain, M. N. Murty, P. J. Flynn, Data clustering: a review ACM Computing Surveys. ,vol. 31, pp. 264- 323 ,(1999) , 10.1145/331499.331504
Li Lin, Christopher Leckie, Chenfeng Zhou, None, Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-Grams 2010 Fourth International Conference on Network and System Security. pp. 113- 119 ,(2010) , 10.1109/NSS.2010.49
Animesh Patcha, Jung-Min Park, None, An overview of anomaly detection techniques: Existing solutions and latest technological trends Computer Networks. ,vol. 51, pp. 3448- 3470 ,(2007) , 10.1016/J.COMNET.2007.02.001
Mikhail Zolotukhin, Timo Hämäläinen, Antti Juvonen, Online anomaly detection by using N-gram model and growing hierarchical self-organizing maps 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC). pp. 47- 52 ,(2012) , 10.1109/IWCMC.2012.6314176
Theuns Verwoerd, Ray Hunt, Intrusion detection techniques and approaches Computer Communications. ,vol. 25, pp. 1356- 1365 ,(2002) , 10.1016/S0140-3664(02)00037-3
Juanying Xie, Shuai Jiang, A Simple and Fast Algorithm for Global K-means Clustering 2010 Second International Workshop on Education Technology and Computer Science. ,vol. 2, pp. 36- 40 ,(2010) , 10.1109/ETCS.2010.347
James H. Garrett, Michael P. Case, James W. Hall, Sudhakar Yerramareddy, Allen Herman, Ruofei Sun, S. Ranjithan, James Westervelt, Engineering applications of neural networks Journal of Intelligent Manufacturing. ,vol. 4, pp. 1- 21 ,(1993) , 10.1007/BF00124977