Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4997
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSwarnkar, Mayanken_US
dc.contributor.authorHubballi, Neminathen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:36:24Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:36:24Z-
dc.date.issued2016-
dc.identifier.citationSwarnkar, M., & Hubballi, N. (2016). OCPAD: One class naive bayes classifier for payload based anomaly detection. Expert Systems with Applications, 64, 330-339. doi:10.1016/j.eswa.2016.07.036en_US
dc.identifier.issn0957-4174-
dc.identifier.otherEID(2-s2.0-84982729685)-
dc.identifier.urihttps://doi.org/10.1016/j.eswa.2016.07.036-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4997-
dc.description.abstractApplication specific attack detection requires packet payload analysis. Current payload analysis techniques suffer from failed detection as they use only the presence or absence of short sequences of a packet in a knowledge-base created out of non-malicious packets. In this paper, we describe OCPAD a content anomaly detection method to identify network packets with suspicious payload content. Proposed method combines the benefits of one class classification and frequency information of short sequences. We adapt one class Multinomial Naive Bayes classifier as anomaly detector for detecting HTTP attacks. OCPAD uses likelihood of each short sequence's occurrence in a payload of known non-malicious packets as a measure to derive the degree of maliciousness of a packet. In the training phase, OCPAD generates the likelihood range of each sequence's occurrence from every packet. In order to store the likelihood range of these sequences, we propose a novel and efficient data structure called Probability Tree. In the testing phase, it treats a short sequence as anomalous if it is not found in the database or its likelihood of occurrence in a packet is not in the range found in training phase. Using the likelihood of anomalous short sequences, it generates a class label for a test packet. Our experiments with a large dataset of 1 million HTTP packets collected from an academic network revealed OCPAD has a high Detection Rate (up to 100%) compared to previous methods and acceptable rate of False Positives (less than 0.6%). © 2016 Elsevier Ltden_US
dc.language.isoenen_US
dc.publisherElsevier Ltden_US
dc.sourceExpert Systems with Applicationsen_US
dc.subjectClassification (of information)en_US
dc.subjectClassifiersen_US
dc.subjectHTTPen_US
dc.subjectKnowledge based systemsen_US
dc.subjectLearning systemsen_US
dc.subjectSignal detectionen_US
dc.subjectTrees (mathematics)en_US
dc.subjectAnomaly detectionen_US
dc.subjectAnomaly detection methodsen_US
dc.subjectEfficient data structuresen_US
dc.subjectFrequency informationen_US
dc.subjectMultinomial naive bayesen_US
dc.subjectNaive Bayes classifiersen_US
dc.subjectOne-class Classificationen_US
dc.subjectPayload analysisen_US
dc.subjectIntrusion detectionen_US
dc.titleOCPAD: One class Naive Bayes classifier for payload based anomaly detectionen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: