Xiaofeng Yang, Mingming Sun, Xuelei Hu, Jingyu Yang
{"title":"Grammar-Based Anomaly Methods for HTTP Attacks","authors":"Xiaofeng Yang, Mingming Sun, Xuelei Hu, Jingyu Yang","doi":"10.1109/CCPR.2009.5344007","DOIUrl":null,"url":null,"abstract":"HTTP-related vulnerabilities are being more commonly exploited as HTTP applications becoming the number one application across the Internet. Several HTTP specific anomaly methods have been proposed, among which grammar-based methods tend more likely to reflect the underlying structure of HTTP communications, therefore showed a promising classifying capability between benign and malicious accesses. Because of being separately proposed among other methods, grammar-based methods have not been summarized and compared directly on the same dataset. This paper presents several grammar-based anomaly methods for HTTP attacks, reveals their detecting capabilities, common features, strengths and drawbacks in comparison with each other.","PeriodicalId":354468,"journal":{"name":"2009 Chinese Conference on Pattern Recognition","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Chinese Conference on Pattern Recognition","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCPR.2009.5344007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
HTTP-related vulnerabilities are being more commonly exploited as HTTP applications becoming the number one application across the Internet. Several HTTP specific anomaly methods have been proposed, among which grammar-based methods tend more likely to reflect the underlying structure of HTTP communications, therefore showed a promising classifying capability between benign and malicious accesses. Because of being separately proposed among other methods, grammar-based methods have not been summarized and compared directly on the same dataset. This paper presents several grammar-based anomaly methods for HTTP attacks, reveals their detecting capabilities, common features, strengths and drawbacks in comparison with each other.