A novel framework for active detection of HTTP based attacks

Liang Jie*, Sun Jianwei, Hu Changzhen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Web application vulnerabilities represent a substantial portion of the security exposures of computer networks. Considering HTTP protocol is stateless, we explore the effectiveness of HTTP-session model to effectively describe http behavior. Based on the HTTP-session model and the analysis of http attack behavior, we present a novel framework to actively detect http attacks. Our method takes http requests as input and calculates anomalous probability for each session attribute and for the session as a whole as output. All the probabilities are weighted and summed up to produce final probability, and this probability is used to decide whether http session is attack or not. We demonstrate the effectiveness of the proposed methods via simulation studies using real-world web access logs. Experiments prove that our detection framework achieves high detection rates under very few false positives.

Original languageEnglish
Title of host publicationCommunication Systems and Information Technology - Selected Papers from the 2011 International Conference on Electric and Electronics, EEIC 2011
Pages411-418
Number of pages8
EditionVOL. 4
DOIs
Publication statusPublished - 2011
Event2011 International Conference on Electric and Electronics, EEIC 2011 - Nanchang, China
Duration: 20 Jun 201122 Jun 2011

Publication series

NameLecture Notes in Electrical Engineering
NumberVOL. 4
Volume100 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference2011 International Conference on Electric and Electronics, EEIC 2011
Country/TerritoryChina
CityNanchang
Period20/06/1122/06/11

Keywords

  • HTTP-session
  • anomaly detection
  • http attacks

Fingerprint

Dive into the research topics of 'A novel framework for active detection of HTTP based attacks'. Together they form a unique fingerprint.

Cite this