On the application of compression-based metrics to identifying anomalous behaviour in web traffic

Logic Journal of the IGPL 28 (4):546-557 (2020)
  Copy   BIBTEX

Abstract

In cybersecurity, there is a call for adaptive, accurate and efficient procedures to identifying performance shortcomings and security breaches. The increasing complexity of both Internet services and traffic determines a scenario that in many cases impedes the proper deployment of intrusion detection and prevention systems. Although it is a common practice to monitor network and applications activity, there is not a general methodology to codify and interpret the recorded events. Moreover, this lack of methodology somehow erodes the possibility of diagnosing whether event detection and recording is adequately performed. As a result, there is an urge to construct general codification and classification procedures to be applied on any type of security event in any activity log. This work is focused on defining such a method using the so-called normalized compression distance (NCD). NCD is parameter-free and can be applied to determine the distance between events expressed using strings. As a first step in the concretion of a methodology for the integral interpretation of security events, this work is devoted to the characterization of web logs. On the grounds of the NCD, we propose an anomaly-based procedure for identifying web attacks from web logs. Given a web query as stored in a security log, a NCD-based feature vector is created and classified using a support vector machine. The method is tested using the CSIC-2010 data set, and the results are analyzed with respect to similar proposals.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,347

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Image Compression Based on Block SVD Power Method.Khalid El Asnaoui - 2019 - Journal of Intelligent Systems 29 (1):1345-1359.

Analytics

Added to PP
2020-08-02

Downloads
18 (#837,580)

6 months
6 (#530,399)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

References found in this work

No Free Lunch Theorems for Optimization.D. H. Wolpert & W. G. Macready - 1997 - IEEE Transactions on Evolutionary Computation 1 (1):67–82.

Add more references