skip to main content
10.1145/948109.948144acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Anomaly detection of web-based attacks

Published:27 October 2003Publication History

ABSTRACT

Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are equipped with a large number of signatures. Unfortunately, it is difficult to keep up with the daily disclosure of web-related vulnerabilities, and, in addition, vulnerabilities may be introduced by installation-specific web-based applications. Therefore, misuse detection systems should be complemented with anomaly detection systems. This paper presents an intrusion detection system that uses a number of different anomaly detection techniques to detect attacks against web servers and web-based applications. The system correlates the server-side programs referenced by client queries with the parameters contained in these queries. The application-specific characteristics of the parameters allow the system to perform focused analysis and produce a reduced number of false positives. The system derives automatically the parameter profiles associated with web applications (e.g., length and structure of parameters) from the analyzed data. Therefore, it can be deployed in very different application environments without having to perform time-consuming tuning and configuration.

References

  1. M. Almgren and U. Lindqvist. Application-Integrated Data Collection for Security Monitoring. In Proceedings of Recent Advances in Intrusion Detection (RAID), LNCS, pages 22--36, Davis,CA, October 2001. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Apache 2.0 Documentation, 2002. http://www.apache.org/.Google ScholarGoogle Scholar
  3. D. Barbara, R. Goel, and S. Jajodia. Mining Malicious Data Corruption with Hidden Markov Models. In 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, Cambridge, England, July 2002.Google ScholarGoogle Scholar
  4. Patrick Billingsley. Probability and Measure. Wiley-Interscience, 3 edition, April 1995.Google ScholarGoogle Scholar
  5. CERT/CC. "Code Red Worm" Exploiting Buffer Overflow In IIS Indexing Service DLL. Advisory CA-2001-19, July 2001.Google ScholarGoogle Scholar
  6. CGI Security Homepage. http://www.cgisecurity.com/, 2002.Google ScholarGoogle Scholar
  7. K. Coar and D. Robinson. The WWW Common Gateway Interface, Version 1.1. Internet Draft, June 1999.Google ScholarGoogle Scholar
  8. csSearch. http://www.cgiscript.net/.Google ScholarGoogle Scholar
  9. Cyberstrider WebWho. http://www.webwho.co.uk/.Google ScholarGoogle Scholar
  10. D.E. Denning. An Intrusion Detection Model. IEEE Transactions on Software Engineering, 13(2):222--232, February 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Fielding et al. Hypertext Transfer Protocol -- HTTP/1.1. RFC 2616, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Forrest. A Sense of Self for UNIX Processes. In Proceedings of the IEEE Symposium on Security and Privacy, pages 120--128, Oakland, CA, May 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A.K. Ghosh, J. Wanken, and F. Charron. Detecting Anomalous and Unknown Intrusions Against Programs. In Proceedings of the Annual Computer Security Applications Conference (ACSAC'98), pages 259--267, Scottsdale, AZ, December 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. K. Ilgun, R.A. Kemmerer, and P.A. Porras. State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3):181--199, March 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. IMP Webmail Client. http://www.horde.org/imp/.Google ScholarGoogle Scholar
  16. H. S. Javitz and A. Valdes. The SRI IDES Statistical Anomaly Detector. In Proceedings of the IEEE Symposium on Security and Privacy, May 1991.Google ScholarGoogle ScholarCross RefCross Ref
  17. C. Ko, M. Ruschitzka, and K. Levitt. Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 175--187, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Kruegel, T. Toth, and E. Kirda. Service Specific Anomaly Detection for Network Intrusion Detection. In Symposium on Applied Computing (SAC). ACM Scientific Press, March 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. Lane and C.E. Brodley. Temporal sequence learning and data reduction for anomaly detection. In Proceedings of the 5th ACM conference on Computer and communications security, pages 150--158. ACM Press, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. W. Lee and S. Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security, 3(4), November 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. W. Lee, S. Stolfo, and K. Mok. Mining in a Data-flow Environment: Experience in Network Intrusion Detection. In Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '99), San Diego, CA, August 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Liberty and D. Hurwitz. Programming ASP.NET. O'REILLY, February 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. U. Lindqvist and P.A. Porras. Detecting Computer and Network Misuse with the Production-Based Expert System Toolset (P-BEST). In IEEE Symposium on Security and Privacy, pages 146--161, Oakland, California, May 1999.Google ScholarGoogle ScholarCross RefCross Ref
  24. Miva HtmlScript. http://www.htmlscript.com/.Google ScholarGoogle Scholar
  25. V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Phorum: PHP Message Board. http://www.phorum.org/.Google ScholarGoogle Scholar
  27. PHP Advisory Homepage. http://www.phpadvisory.com/, 2002.Google ScholarGoogle Scholar
  28. M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference, November 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Security Focus Homepage. http://www.securityfocus.com/, 2002.Google ScholarGoogle Scholar
  30. Andreas Stolcke and Stephen Omohundro. Hidden Markov Model Induction by Bayesian Model Merging. Advances in Neural Information Processing Systems, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Andreas Stolcke and Stephen Omohundro. Inducing Probabilistic Grammars by Bayesian Model Merging. In Conference on Grammatical Inference, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. K. Tan and R. Maxion. "Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. In Proceedings of the IEEE Symposium on Security and Privacy, pages 188--202, Oakland, CA, May 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Robert Tarjan. Depth-First Search and Linear Graph Algorithms. SIAM Journal of Computing, 1(2):10--20, June 1972.Google ScholarGoogle ScholarCross RefCross Ref
  34. Security Tracker. Vulnerability statistics April 2001-march 2002. http://www.securitytracker.com/learn/statistics.html, April 2002.Google ScholarGoogle Scholar
  35. N. Ye, Y. Zhang, and C. M. Borror. Robustness of the Markov chain model for cyber attack detection. IEEE Transactions on Reliability, 52(3), September 2003.Google ScholarGoogle Scholar

Index Terms

  1. Anomaly detection of web-based attacks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
      October 2003
      374 pages
      ISBN:1581137389
      DOI:10.1145/948109

      Copyright © 2003 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 October 2003

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader