HMMPayl: An intrusion detection system based on Hidden Markov Models

被引:78
作者
Ariu, Davide [1 ]
Tronci, Roberto [1 ]
Giacinto, Giorgio [1 ]
机构
[1] Univ Cagliari Piazza Armi, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
Network intrusion detection; Anomaly detection; Multiple classifiers; Hidden Markov Models; Payload analysis; PROBABILISTIC FUNCTIONS; FUSION;
D O I
10.1016/j.cose.2010.12.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays the security of Web applications is one of the key topics in Computer Security. Among all the solutions that have been proposed so far, the analysis of the HTTP payload at the byte level has proven to be effective as it does not require the detailed knowledge of the applications running on the Web server. The solutions proposed in the literature actually achieved good results for the detection rate, while there is still room for reducing the false positive rate. To this end, in this paper we propose HMMPayl, an IDS where the payload is represented as a sequence of bytes, and the analysis is performed using Hidden Markov Models (HMM). The algorithm we propose for feature extraction and the joint use of HMM guarantee the same expressive power of n - gram analysis, while allowing to overcome its computational complexity. In addition, we designed HMMPayl following the Multiple Classifiers System paradigm to provide for a better classification accuracy, to increase the difficulty of evading the IDS, and to mitigate the weaknesses due to a non optimal choice of HMM parameters. Experimental results, obtained both on public and private datasets, show that the analysis performed by HMMPayl is particularly effective against the most frequent attacks toward Web applications (such as XSS and SQL-Injection). In particular, for a fixed false positive rate, HMMPayl achieves a higher detection rate respect to previously proposed approaches it has been compared with. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:221 / 241
页数:21
相关论文
共 49 条
[21]  
*F5 NETW INC, 2009, BIG IP APPL SEC MAN
[22]   Using artificial anomalies to detect unknown and known network intrusions [J].
Fan, W ;
Miller, A ;
Stolfo, S ;
Lee, W ;
Chan, P .
KNOWLEDGE AND INFORMATION SYSTEMS, 2004, 6 (05) :507-527
[23]  
Fogla P., 2006, Proceedings of the 13th ACM conference on Computer and communications security, P59, DOI 10.1145/1180405.1180414
[24]   Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance [J].
Gao, Debin ;
Reiter, Michael K. ;
Song, Dawn .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (02) :96-110
[25]  
Günter S, 2003, PROC INT CONF DOC, P472
[26]  
Ingham KL, 2007, LECT NOTES COMPUT SC, V4637, P42
[27]  
*INT SEC SYST, 2010, IBM ISS X FORC 2009
[28]  
Krgel C., 2002, P 2002 ACM S APPL CO, P201, DOI DOI 10.1145/508791.508835
[29]  
Kruegel Christopher., 2003, P 10 ACM C COMPUTER, P251, DOI 10.1145/948109.948144
[30]  
Kuncheva L., 2000, STUD FUZZ SOFT COMP, V49