Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics 2015
DOI: 10.1145/2713579.2713586
|View full text |Cite
|
Sign up to set email alerts
|

Application-Specific Traffic Anomaly Detection Using Universal Background Model

Abstract: This paper presents an application-specific intrusion detection framework in order to address the problem of detecting intrusions in individual applications when their traffic exhibits anomalies. The system is based on the assumption that authorized traffic analyzers have access to a trustworthy binding between network traffic and the source application responsible for it. Given traffic flows generated by individual genuine application, we exploit the GMM-UBM (Gaussian Mixture Model-Universal Background Model)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Regarding a possible evasion by a sophisticated, detection‐aware intrusion, we have defined a blend of existing real‐time methodologies for building our application‐specific profiles and described a possible anomaly detection system in order to detect intrusions in applications. We are currently working on extending our framework , for generating application‐specific profiles.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Regarding a possible evasion by a sophisticated, detection‐aware intrusion, we have defined a blend of existing real‐time methodologies for building our application‐specific profiles and described a possible anomaly detection system in order to detect intrusions in applications. We are currently working on extending our framework , for generating application‐specific profiles.…”
Section: Resultsmentioning
confidence: 99%
“…In , we proposed a detection system that exploits application‐specific traffic profiles in order to validate the genuinity of a claimed application. Unlike binary classifiers, each specific profile is built only from normal traffic instances of one specific application.…”
Section: Discussionmentioning
confidence: 99%
“…These methods have the ability to provide near real-time detection with high accuracy levels. However, as for payload-based classification, also payload-based verification suffers from high computational costs, privacy concerns, and difficulties when dealing with encrypted or otherwise securely encapsulated traffic [39]. Alternative approaches utilise the information available in the non-encrypted IP packet header and analyse statistical characteristics of flows regardless of packet payload.…”
Section: B Traffic Verificationmentioning
confidence: 99%
“…To meet the first requirement, we proposed architectures that provide a binding between network traffic and source application that allows checking whether a packet/flow claimed by an application conforms to its expected traffic model [42], [43]. For the second requirement, we proposed GMM with automatic learning to model per-application traffic [2], [39], [44]. However, our prior application-specific models were still trained with features obtained from the entire packet flows and were not accurate enough for detecting anomalies in a timely manner before the end of a flow.…”
Section: B Traffic Verificationmentioning
confidence: 99%