2011
DOI: 10.1016/j.cose.2010.12.004
|View full text |Cite
|
Sign up to set email alerts
|

HMMPayl: An intrusion detection system based on Hidden Markov Models

Abstract: Nowadays the security of Web applications is one of the key topics in Computer Security. Among all the solutions that have been proposed so far, the analysis of the HTTP payload at the byte level has proven to be effective as it does not require the detailed knowledge of the applications running on the Web server. The solutions proposed in the literature actually achieved good results for the detection rate, while there is still room for reducing the false positive rate.To this end, in this paper we propose HM… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
89
0
2

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 116 publications
(91 citation statements)
references
References 39 publications
0
89
0
2
Order By: Relevance
“…Anomaly detection mechanisms employ a model of legitimate network traffic (Xie and Yu 2009)-and treat unlikely traffic patterns as attacks. For Fraction of all connections of all clients that specified HTTP header field Content-Type as any text variant the detection of SQL-injection, cross-site-scripting (XSS), and PHP file-inclusion (L/RFI), traffic can be modeled based on HTTP header and query string information using HMMs (Ariu et al 2011), n-gram models (Wressnegger et al 2013), general kernels (Düssel et al 2008), or other models (Robertson and Maggi 2010). Anomaly-detection mechanisms were investigated, from centroid anomaly-detection models (Kloft and Laskov 2012) to setting hard thresholds on the likelihood of new HTTP requests given the model, to unsupervised learning of support-vector data description (SVDD) models (Düssel et al 2008, Görnitz et al 2013.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Anomaly detection mechanisms employ a model of legitimate network traffic (Xie and Yu 2009)-and treat unlikely traffic patterns as attacks. For Fraction of all connections of all clients that specified HTTP header field Content-Type as any text variant the detection of SQL-injection, cross-site-scripting (XSS), and PHP file-inclusion (L/RFI), traffic can be modeled based on HTTP header and query string information using HMMs (Ariu et al 2011), n-gram models (Wressnegger et al 2013), general kernels (Düssel et al 2008), or other models (Robertson and Maggi 2010). Anomaly-detection mechanisms were investigated, from centroid anomaly-detection models (Kloft and Laskov 2012) to setting hard thresholds on the likelihood of new HTTP requests given the model, to unsupervised learning of support-vector data description (SVDD) models (Düssel et al 2008, Görnitz et al 2013.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…HMM can also be used in network security. Ariu [8] proposed a novel solution where the HTTP payload is analyzed using hidden Markov model. The proposed system, named HMMPayl, had high classification accuracy and was very effective on most common attacks of the Web application.…”
Section: Introductionmentioning
confidence: 99%
“…Several approaches have been proposed so far to compute the model from network data [15]. Statistic-based approaches [16] define the normal model as the probabilities of appearance of certain patterns in the training data, using thresholds and basic statistical operators such as the standard deviation, mean, covariance, etc. Heuristic-based approaches automatically generate the model of normal behavior using different approaches such as machine learning algorithms [4], evolutionary systems [17] or other artificial intelligence methods [18].…”
Section: Anomaly-based Nidsmentioning
confidence: 99%