首页> 外文期刊>Journal of network and systems management >Flow-Based Web Application Brute-Force Attack and Compromise Detection
【24h】

Flow-Based Web Application Brute-Force Attack and Compromise Detection

机译:基于流的Web应用程序暴力破解和威胁检测

获取原文
获取原文并翻译 | 示例
           

摘要

In the early days of network and service management, researchers paid much attention to the design of management frameworks and protocols. Since then the focus of research has shifted from the development of management technologies towards the analysis of management data. From the five FCAPS areas, security of networks and services has become a key challenge. For example, brute-force attacks against Web applications, and compromises resulting thereof, are widespread. Talks with several Top-10 Web hosting companies in the Netherlands reflect that detection of these attacks is often done based on log file analysis on servers, or by deploying host-based intrusion detection systems (IDSs) and firewalls. However, such host-based solutions have several problems. In this paper we therefore investigate the feasibility of a network-based monitoring approach, which detects brute-force attacks against and compromises of Web applications, even in encrypted environments. Our approach is based on per-connection histograms of packet payload sizes in flow data that are exported using IPFIX. We validate our approach using datasets collected in the production network of a large Web hoster in the Netherlands.
机译:在网络和服务管理的早期,研究人员非常关注管理框架和协议的设计。从那时起,研究重点已从管理技术的发展转向管理数据的分析。从五个FCAPS领域来看,网络和服务的安全性已成为关键挑战。例如,针对Web应用程序的蛮力攻击及其造成的危害已经广泛存在。与荷兰几家排名前十的Web托管公司的谈话反映出,通常基于服务器上的日志文件分析或通过部署基于主机的入侵检测系统(IDS)和防火墙来检测这些攻击。但是,这种基于主机的解决方案有几个问题。因此,在本文中,我们研究了基于网络的监视方法的可行性,该方法即使在加密环境中也可以检测针对Web应用程序的暴力攻击和破坏。我们的方法基于使用IPFIX导出的流数据中数据包有效负载大小的每次连接直方图。我们使用在荷兰的大型Web托管商的生产网络中收集的数据集来验证我们的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号