DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cho S. | ko |
dc.contributor.author | Cha, Sungdeok | ko |
dc.date.accessioned | 2013-03-03T12:17:29Z | - |
dc.date.available | 2013-03-03T12:17:29Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2004 | - |
dc.identifier.citation | COMPUTERS & SECURITY, v.23, no.4, pp.312 - 319 | - |
dc.identifier.issn | 0167-4048 | - |
dc.identifier.uri | http://hdl.handle.net/10203/78626 | - |
dc.description.abstract | Web attacks are too numerous in numbers and serious in potential consequences for modern society to tolerate. Unfortunately, current generation signature-based intrusion detection systems (IDS) are inadequate, and security techniques such as firewalls or access control mechanisms do not work well when trying to secure web services. In this paper, we empirically demonstrate that the Bayesian parameter estimation method is effective in analyzing web togs and detecting anomalous sessions. When web attacks were simulated with Whisker software, Snort, a well-known IDS based on misuse detection, caught only slightly more than one third of web attacks. Our technique, session anomaly detection (SAD), on the other hand, detected nearly all such attacks without having to rely on attack signatures at all. SAD works by first developing normal usage profile and comparing the web togs, as they are generated, against the expected frequencies. Our research indicates that SAD has the potential of detecting previously unknown web attacks and that the proposed approach would play a key rote in developing an integrated environment to provide secure and reliable web services. (C) 2004 Elsevier Ltd. All rights reserved. | - |
dc.language | English | - |
dc.publisher | ELSEVIER ADVANCED TECHNOLOGY | - |
dc.title | SAD: web session anomaly detection based on parameter estimation | - |
dc.type | Article | - |
dc.identifier.wosid | 000222408000017 | - |
dc.identifier.scopusid | 2-s2.0-2942533003 | - |
dc.type.rims | ART | - |
dc.citation.volume | 23 | - |
dc.citation.issue | 4 | - |
dc.citation.beginningpage | 312 | - |
dc.citation.endingpage | 319 | - |
dc.citation.publicationname | COMPUTERS & SECURITY | - |
dc.identifier.doi | 10.1016/j.cose.2004.01.006 | - |
dc.contributor.nonIdAuthor | Cho S. | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | computer security | - |
dc.subject.keywordAuthor | intrusion detection | - |
dc.subject.keywordAuthor | anomaly | - |
dc.subject.keywordAuthor | detection | - |
dc.subject.keywordAuthor | web attacks | - |
dc.subject.keywordAuthor | parameter estimation | - |
dc.subject.keywordAuthor | machine learning | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.