Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4997
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Swarnkar, Mayank | en_US |
dc.contributor.author | Hubballi, Neminath | en_US |
dc.date.accessioned | 2022-03-17T01:00:00Z | - |
dc.date.accessioned | 2022-03-17T15:36:24Z | - |
dc.date.available | 2022-03-17T01:00:00Z | - |
dc.date.available | 2022-03-17T15:36:24Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Swarnkar, M., & Hubballi, N. (2016). OCPAD: One class naive bayes classifier for payload based anomaly detection. Expert Systems with Applications, 64, 330-339. doi:10.1016/j.eswa.2016.07.036 | en_US |
dc.identifier.issn | 0957-4174 | - |
dc.identifier.other | EID(2-s2.0-84982729685) | - |
dc.identifier.uri | https://doi.org/10.1016/j.eswa.2016.07.036 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/4997 | - |
dc.description.abstract | Application specific attack detection requires packet payload analysis. Current payload analysis techniques suffer from failed detection as they use only the presence or absence of short sequences of a packet in a knowledge-base created out of non-malicious packets. In this paper, we describe OCPAD a content anomaly detection method to identify network packets with suspicious payload content. Proposed method combines the benefits of one class classification and frequency information of short sequences. We adapt one class Multinomial Naive Bayes classifier as anomaly detector for detecting HTTP attacks. OCPAD uses likelihood of each short sequence's occurrence in a payload of known non-malicious packets as a measure to derive the degree of maliciousness of a packet. In the training phase, OCPAD generates the likelihood range of each sequence's occurrence from every packet. In order to store the likelihood range of these sequences, we propose a novel and efficient data structure called Probability Tree. In the testing phase, it treats a short sequence as anomalous if it is not found in the database or its likelihood of occurrence in a packet is not in the range found in training phase. Using the likelihood of anomalous short sequences, it generates a class label for a test packet. Our experiments with a large dataset of 1 million HTTP packets collected from an academic network revealed OCPAD has a high Detection Rate (up to 100%) compared to previous methods and acceptable rate of False Positives (less than 0.6%). © 2016 Elsevier Ltd | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier Ltd | en_US |
dc.source | Expert Systems with Applications | en_US |
dc.subject | Classification (of information) | en_US |
dc.subject | Classifiers | en_US |
dc.subject | HTTP | en_US |
dc.subject | Knowledge based systems | en_US |
dc.subject | Learning systems | en_US |
dc.subject | Signal detection | en_US |
dc.subject | Trees (mathematics) | en_US |
dc.subject | Anomaly detection | en_US |
dc.subject | Anomaly detection methods | en_US |
dc.subject | Efficient data structures | en_US |
dc.subject | Frequency information | en_US |
dc.subject | Multinomial naive bayes | en_US |
dc.subject | Naive Bayes classifiers | en_US |
dc.subject | One-class Classification | en_US |
dc.subject | Payload analysis | en_US |
dc.subject | Intrusion detection | en_US |
dc.title | OCPAD: One class Naive Bayes classifier for payload based anomaly detection | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: