Detecting zero-day attacks using context-aware anomaly detection at the application-layer

被引:42
|
作者
Duessel, Patrick [1 ]
Gehl, Christian [2 ]
Flegel, Ulrich [3 ]
Dietrich, Sven [4 ]
Meier, Michael [1 ]
机构
[1] Univ Bonn, Inst Comp Sci 4, Friedrich Ebert Allee 144, D-53113 Bonn, Germany
[2] Trifense GmbH Intelligent Network Def, Germendorfer Str 79, D-16727 Velten, Germany
[3] Infineon Technol AG, Campeon 1-12, D-86579 Neubiberg, Germany
[4] CUNY John Jay Coll Criminal Justice, Math & Comp Sci Dept, 524 West 59th St, New York, NY 10019 USA
关键词
Intrusion detection; Machine learning; Anomaly detection; Protocol analysis; Deep packet inspection;
D O I
10.1007/s10207-016-0344-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection allows for the identification of unknown and novel attacks in network traffic. However, current approaches for anomaly detection of network packet payloads are limited to the analysis of plain byte sequences. Experiments have shown that application-layer attacks become difficult to detect in the presence of attack obfuscation using payload customization. The ability to incorporate syntactic context into anomaly detection provides valuable information and increases detection accuracy. In this contribution, we address the issue of incorporating protocol context into payload-based anomaly detection. We present a new data representation, called -grams, that allows to integrate syntactic and sequential features of payloads in an unified feature space and provides the basis for context-aware detection of network intrusions. We conduct experiments on both text-based and binary application-layer protocols which demonstrate superior accuracy on the detection of various types of attacks over regular anomaly detection methods. Furthermore, we show how -grams can be used to interpret detected anomalies and thus, provide explainable decisions in practice.
引用
收藏
页码:475 / 490
页数:16
相关论文
共 50 条
  • [21] On the Context-Aware Anomaly Detection in Vehicular Networks
    Aljaafari, Mohammed Abdullatif H.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (12) : 832 - 840
  • [22] Context-Aware Transfer Attacks for Object Detection
    Cai, Zikui
    Xie, Xinxin
    Li, Shasha
    Yin, Mingjun
    Song, Chengyu
    Krishnamurthy, Srikanth V.
    Roy-Chowdhury, Amit K.
    Asif, M. Salman
    THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 149 - 157
  • [23] Detection of zero-day attacks: An unsupervised port-based approach
    Blaise, Agathe
    Bouet, Mathieu
    Conan, Vania
    Secci, Stefano
    COMPUTER NETWORKS, 2020, 180 (180)
  • [24] Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
    Holm, Hannes
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4895 - 4904
  • [25] IoTZeroJar: Towards a Honeypot Architecture for Detection of Zero-Day Attacks in IoT
    Ellouh, Mahmoud
    Ghaleb, Mustafa
    Felemban, Muhamad
    Proceedings - 2022 14th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2022, 2022, : 765 - 771
  • [26] Strategy-Aware Mitigation Using Markov Games for Dynamic Application-Layer Attacks
    Emami-Taba, Mahsa
    Amoui, Mehdi
    Tahvildari, Ladan
    2015 IEEE 16TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE), 2015, : 134 - 141
  • [27] Detection of zero-day attacks via sample augmentation for the Internet of Vehicles
    Xu, Bingfeng
    Zhao, Jincheng
    Wang, Bo
    He, Gaofeng
    VEHICULAR COMMUNICATIONS, 2025, 52
  • [28] Context-Aware Activity Recognition and Anomaly Detection in Video
    Zhu, Yingying
    Nayak, Nandita M.
    Roy-Chowdhury, Amit K.
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2013, 7 (01) : 91 - 101
  • [29] An intrusion detection model to detect zero-day attacks in unseen data using machine learning
    Dai, Zhen
    Por, Lip Yee
    Chen, Yen-Lin
    Yang, Jing
    Ku, Chin Soon
    Alizadehsani, Roohallah
    Plawiak, Pawel
    PLOS ONE, 2024, 19 (09):
  • [30] Detection of application-layer DDoS attacks using machine learning and genetic algorithms
    Sharif, Dyari Mohammed
    Beitollahi, Hakem
    COMPUTERS & SECURITY, 2023, 135