User session modeling for effective application intrusion detection

3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

With the number of data breaches on a rise, effective and efficient detection of anomalous activities in applications which manages data is critical. In this paper, we introduce a novel approach to improve attack detection at application layer by modeling user sessions as a sequence of events instead of analyzing every single event in isolation.We also argue that combining application access logs and the corresponding data access logs to generate unified logs eliminates the need to analyze them separately thereby resulting in an efficient and accurate system. We evaluate various methods such as conditional random fields, support vector machines, decision trees and naive Bayes, and experimental results show that our approach based on conditional random fields is feasible and can detect attacks at an early stage even when they are disguised within normal events. © 2008 Springer Science+Business Media, LLC.

Cite

CITATION STYLE

APA

Gupta, K. K., Nath, B., & Ramamohanarao, K. (2008). User session modeling for effective application intrusion detection. In IFIP International Federation for Information Processing (Vol. 278, pp. 269–283). Springer New York. https://doi.org/10.1007/978-0-387-09699-5_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free