DocumentCode :
2716889
Title :
Anomaly Detection for Application Level Network Attacks Using Payload Keywords
Author :
Zhang, Like ; White, Gregory B.
Author_Institution :
Dept. of Comput. Sci., Texas Univ., San Antonio, TX
fYear :
2007
fDate :
1-5 April 2007
Firstpage :
178
Lastpage :
185
Abstract :
Network anomaly intrusion detection is designed to provide in-depth defense against zero-day attacks. However, attacks often occur at the application level, which means they are payload associated. Since traditional anomaly detection works by monitoring packet headers it provides little support for defending against such activities. In this paper, we will explore how the packet payload can be used for identifying application level attacks. First we will discuss the current status of network anomaly detection, and emphasize the importance of payload based detection research using existing problems. Then we provide a brief introduction to several related approaches on this topic. Based on the discussion, an efficient method to detect payload related attacks will then be proposed. The method is divided into a training phase and a detection phase. In the training phase, we will perform principal component analysis (PCA) on several important packet fields to reduce the data dimension, and then construct the most appropriate profile based on the PCA results. In the detection phase, an anomaly score will be assigned to each incoming packet based on the profile. We then present the experiment based on the DARPA ´99 dataset with details to explain our approach. Comparison with other similar mechanisms demonstrates the advantage of the proposed method at identifying payload related attacks.
Keywords :
computer networks; principal component analysis; security of data; telecommunication security; anomaly detection; application level attacks; application level network attacks; data dimension; network anomaly intrusion detection; packet headers; packet payload; payload based detection research; payload keywords; principal component analysis; zero-day attacks; Application software; Computational intelligence; Computer science; Computer security; Intrusion detection; Machine learning algorithms; Payloads; Phase detection; Principal component analysis; USA Councils;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence in Security and Defense Applications, 2007. CISDA 2007. IEEE Symposium on
Conference_Location :
Honolulu, HI
Print_ISBN :
1-4244-0700-1
Type :
conf
DOI :
10.1109/CISDA.2007.368151
Filename :
4219098
Link To Document :
بازگشت