...
首页> 外文期刊>Expert Systems with Application >OCPAD: One class Naive Bayes classifier for payload based anomaly detection
【24h】

OCPAD: One class Naive Bayes classifier for payload based anomaly detection

机译:OCPAD:一类朴素贝叶斯分类器,用于基于有效载荷的异常检测

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Application specific attack detection requires packet payload analysis. Current payload analysis techniques suffer from failed detection as they use only the presence or absence of short sequences of a packet in a knowledge-base created out of non-malicious packets. In this paper, we describe OCPAD a content anomaly detection method to identify network packets with suspicious payload content. Proposed method combines the benefits of one class classification and frequency information of short sequences. We adapt one class Multinomial Naive Bayes classifier as anomaly detector for detecting HTTP attacks. OCPAD uses likelihood of each short sequence's occurrence in a payload of known non-malicious packets as a measure to derive the degree of maliciousness of a packet. In the training phase, OCPAD generates the likelihood range of each sequence's occurrence from every packet. In order to store the likelihood range of these sequences, we propose a novel and efficient data structure called Probability Tree. In the testing phase, it treats a short sequence as anomalous if it is not found in the database or its likelihood of occurrence in a packet is not in the range found in training phase. Using the likelihood of anomalous short sequences, it generates a class label for a test packet. Our experiments with a large dataset of 1 million HTTP packets collected from an academic network revealed OCPAD has a high Detection Rate (up to 100%) compared to previous methods and acceptable rate of False Positives (less than 0.6%). (C) 2016 Elsevier Ltd. All rights reserved.
机译:特定于应用程序的攻击检测需要数据包有效负载分析。当前的有效载荷分析技术遭受失败的检测,因为它们仅使用由非恶意数据包创建的知识库中的数据包短序列的存在或不存在。在本文中,我们描述了OCPAD一种内容异常检测方法,用于识别具有可疑有效载荷内容的网络数据包。提出的方法结合了一类分类和短序列频率信息的优点。我们将一类多项式朴素贝叶斯分类器作为用于检测HTTP攻击的异常检测器。 OCPAD使用已知的非恶意数据包的有效载荷中每个短序列出现的可能性作为导出数据包恶意程度的措施。在训练阶段,OCPAD从每个数据包生成每个序列出现的可能性范围。为了存储这些序列的似然范围,我们提出了一种新颖而有效的数据结构,称为概率树。在测试阶段,如果在数据库中找不到短序列,或者在数据包中出现的可能性不在训练阶段的范围内,它将短序列视为异常。使用异常短序列的可能性,它为测试数据包生成一个类别标签。我们对来自学术网络的100万个HTTP数据包的大型数据集进行的实验表明,与以前的方法相比,OCPAD具有较高的检测率(高达100%)和可接受的误报率(小于0.6%)。 (C)2016 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号