2014
DOI: 10.1016/j.cose.2014.06.002
|View full text |Cite
|
Sign up to set email alerts
|

HTTP attack detection using n-gram analysis

Abstract: HTTP Attack Detection using N -gram Analysis by Adityaram OzaPrevious research has shown that byte level analysis of HTTP traffic offers a practical solution to the problem of network intrusion detection and traffic analysis.Such an approach does not require any knowledge of applications running on web servers or any pre-processing of incoming data. In this project, we apply three n-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…Support Vector Machines are a supervised learning methods, training a maximal margin separating hyperplane between linearly separable class data. While this can also be extended to non-linearly separable class data, we are using a linear kernel, which has shown very good results given sufficiently high-dimensional data, and specifically for protocolbased communication data [19][20][21]60]. For the MCP evaluation we are using a one-vs-rest (OVR) approach, as this includes calculating a separating hyperplane for each model class MC, which allows a confidence calibration to optimize the system precision, as explained in the next section.…”
Section: Learning Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Support Vector Machines are a supervised learning methods, training a maximal margin separating hyperplane between linearly separable class data. While this can also be extended to non-linearly separable class data, we are using a linear kernel, which has shown very good results given sufficiently high-dimensional data, and specifically for protocolbased communication data [19][20][21]60]. For the MCP evaluation we are using a one-vs-rest (OVR) approach, as this includes calculating a separating hyperplane for each model class MC, which allows a confidence calibration to optimize the system precision, as explained in the next section.…”
Section: Learning Methodsmentioning
confidence: 99%
“…sequences of n arbitrary tokens. This feature representation is similar to spectrum kernels [12] and originates in the field of natural language processing [13][14][15][16], but has also been extended to network communication [17][18][19][20][21]. However, we are extending this structural feature type by including additional temporal information, and by also integrating a wider context for each token n-gram, an idea similar to the integration of additional context information as introduced in [22] for the CBOW (continuous bag of words) and Skip-gram models.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Mahalanobis distance is used to find the hidden correlation between the patterns and features. Oza et al proposed HTTP flooding attacks detection using statistical methods such as pattern counting, chi-square distance analysis, and ad-hoc distance measures and preprocessed each HTTP request by using n-gram analysis [34]. These methods take more time for the identification of traffic and also results in false positives.…”
Section: Web-based Attacksmentioning
confidence: 99%
“…In encrypted traffic environments, secure sockets layer (SSL), wired equivalent privacy WEP, or Internet protocol security (IPsec) protocols are utilised to offer better privacy and confidentiality. Previous work in detecting web-based attacks mainly focused on investigating the log/payload content [44,45]. In view that the traffic is encrypted, payload (log) is unavailable as the content is indecipherable.…”
Section: Attack On Webmentioning
confidence: 99%