2010
DOI: 10.1007/978-3-642-17650-0_29
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Such values can be interpreted, for example, as a measure of the signature's accuracy or the confidence given to the suspicious payload from which the pattern was obtained [18]. Whatever the case, trust values in signatures can be helpful to reduce false positives and to prioritize rule application, among others.…”
Section: Analysis and Discussionmentioning
confidence: 98%
See 1 more Smart Citation
“…Such values can be interpreted, for example, as a measure of the signature's accuracy or the confidence given to the suspicious payload from which the pattern was obtained [18]. Whatever the case, trust values in signatures can be helpful to reduce false positives and to prioritize rule application, among others.…”
Section: Analysis and Discussionmentioning
confidence: 98%
“…To evaluate our proposal, we have first gathered a dataset composed of normal, attack-free HTTP traffic collected during several weeks in an academic institution [18]. The traces, to which we will refer as PVH, contain traffic destined to a web server that offers information about teaching, degrees, and includes utilities supporting administrative tasks and other daily activities carried out by both students and university staff.…”
Section: Datasets and Evaluation Frameworkmentioning
confidence: 99%
“…A dataset has to be suited for the specific model and parameters used by the anomaly detector. In this regard, the findings of this work are limited to detectors of anomalous HTTP requests based on probabilistic models (e.g., n-gram [33], or Markov-based models [34]). In particular, the AIDS used in this work is based on 1-grammar since the authors are largely experienced in this technique (see [35]), which is simple enough as to let the reader stay focused on the contribution.…”
Section: Reference Aids and Terminologymentioning
confidence: 99%
“…One example of the sequence of transactions can be shown as llmhmlhm. The types of purchases such [13], [27], [43], [86], [93], [101], [107] [2], [34], [39], [50], [59], [113], [118] [30], [41], [77], [83] [4], [8], [17], [36], [38], [42] [6], [7], [18], [48], [74], [92] [28], [33], [40], [47], [53], [67], [71], [97], [105], [114], [116], [119] [54], [55], [112] [15], [70], [77], [95], [99], [102] [10], [44], [66] [41], [53], [56], [74],…”
Section: Credit Card Fraud Detectionmentioning
confidence: 99%
“…The K-means clustering method is used for determining different network states and calculating transitions between the states. Other research in this category includes [70,95] in which HMM behavioral models are created using the payloads of transmission control protocol (TCP)/internet protocol (IP) packets exchanged in the network to create malicious behavior. The data sources for creating these models are raw packets retrieved from the network.…”
Section: Network Levelmentioning
confidence: 99%