2008
DOI: 10.1007/978-3-540-89862-7_17
|View full text |Cite
|
Sign up to set email alerts
|

Incorporation of Application Layer Protocol Syntax into Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 17 publications
0
15
0
Order By: Relevance
“…Anomaly detection mechanisms employ a model of legitimate network traffic (Xie and Yu 2009)-and treat unlikely traffic patterns as attacks. For Fraction of all connections of all clients that specified HTTP header field Content-Type as any text variant the detection of SQL-injection, cross-site-scripting (XSS), and PHP file-inclusion (L/RFI), traffic can be modeled based on HTTP header and query string information using HMMs (Ariu et al 2011), n-gram models (Wressnegger et al 2013), general kernels (Düssel et al 2008), or other models (Robertson and Maggi 2010). Anomaly-detection mechanisms were investigated, from centroid anomaly-detection models (Kloft and Laskov 2012) to setting hard thresholds on the likelihood of new HTTP requests given the model, to unsupervised learning of support-vector data description (SVDD) models (Düssel et al 2008, Görnitz et al 2013.…”
Section: Discussion and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Anomaly detection mechanisms employ a model of legitimate network traffic (Xie and Yu 2009)-and treat unlikely traffic patterns as attacks. For Fraction of all connections of all clients that specified HTTP header field Content-Type as any text variant the detection of SQL-injection, cross-site-scripting (XSS), and PHP file-inclusion (L/RFI), traffic can be modeled based on HTTP header and query string information using HMMs (Ariu et al 2011), n-gram models (Wressnegger et al 2013), general kernels (Düssel et al 2008), or other models (Robertson and Maggi 2010). Anomaly-detection mechanisms were investigated, from centroid anomaly-detection models (Kloft and Laskov 2012) to setting hard thresholds on the likelihood of new HTTP requests given the model, to unsupervised learning of support-vector data description (SVDD) models (Düssel et al 2008, Görnitz et al 2013.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…A great variety of heuristic and principled approaches is used. In our study, we represent this family of approaches by SVDD which has been used successfully for several related computer-security problems (Düssel et al 2008;Görnitz et al 2013). Prior work generally uses smaller feature sets.…”
Section: Reference Methodsmentioning
confidence: 99%
“…In contrast to previous applications of anomaly detection to web attack detection, e.g. [8,22,7,2,3,20], our method not only detects, but reacts to such attacks. We have developed a prototype of a reverse proxy called TokDoc which implements the idea of mangling coupled with anomaly detection.…”
Section: Introductionmentioning
confidence: 93%
“…Their algorithm learns a finite automaton representation from tokenized web request headers. Düssel et al [53] detect deviating web request headers using support vector machines (SVM), where feature extraction and SVM kernel incorporate application layer syntax. Spectrogram [173] reassembles bidirectional TCP network streams between client and service, and multiple Markov chains evaluate URIs in HTTP GET requests or message bodies in HTTP POST requests.…”
Section: Anomaly Detection In Web Interactionmentioning
confidence: 99%