Attacker group detection method based on HTTP payload analysis
نویسندگان
چکیده
Attacks on web applications are a frequent vector of attack information resources by attackers various skill levels. Such attacks can be investigated through analysis HTTP requests made the attackers. The possibility identifying groups based payload marked IDS as events has been studied. identification improves work security analysts investigating and responding to incidents, reduces impact alert fatigue in events, also helps patterns intruders. Identification within framework proposed method is performed sequence stages. At first stage, split into tokens regular expression features protocol that often encountered detected intrusion detection systems. Then weighted using TF-IDF method, which allows further give greater contribution when comparing coincidence rare words. next stage main core separated their distance from origin. Thus, not containing words, us talk about connectedness separated. Manhattan used determine distance. Finally, clustering carried out DBSCAN method. It shown request data identify An efficient tokenization, weighting considered proposed. use for homogeneity, completeness V-measure obtained methods CPTC-2018 dataset were evaluated. obtaining with high homogeneity sufficient completeness. combine resulting clusters other obtain metric while maintaining homogeneity. SOC, CERT CSIRT, both defending against intrusions including APT collecting attackers’ techniques tactics. makes it possible traces tools attackers, attribution attacks.
منابع مشابه
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملAnomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised and very effecient fashion. We first compute during a training phase a profile byte frequency distribution and their standard deviation of the application payload flowing to a single host and port. We then use Mahala...
متن کاملInterval-Valued Hesitant Fuzzy Method based on Group Decision Analysis for Estimating Weights of Decision Makers
In this paper, a new soft computing group decision method based on the concept of compromise ratio is introduced for determining decision makers (DMs)' weights through the group decision process under uncertainty. In this method, preferences and judgments of the DMs or experts are expressed by linguistic terms for rating the industrial alternatives among selected criteria as well as the relativ...
متن کاملNetwork packet payload analysis for intrusion detection
This paper explores possibility of detecting intrusions into computer networks using network packet payload analysis. Quick overview of current IDS state of the art is given. Issues with IDS are explained. Integrated approach to IDS building is suggested. Anomaly detection process improvements are recomended. Current prevailing methods for network intrusion detection based on packet meta data, ...
متن کاملA high payload steganographic algorithm based on edge detection
Article history: Received 30 July 2016 Received in revised form 30 October 2016 Accepted 30 December 2016 Available online 3 January 2017
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nau?no-tehni?eskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki
سال: 2023
ISSN: ['2226-1494', '2500-0373']
DOI: https://doi.org/10.17586/2226-1494-2023-23-3-500-505