User Session Modeling For Effective Application Intrusion Detection

Kapil Kumar Gupta,Baikunth Nath,Kotagiri Ramamohanarao
DOI: https://doi.org/10.1007/978-0-387-09699-5_18
2008-01-01
Abstract:With the number of data breaches on a rise, effective and efficient detection of anomalous activities in applications which manages data is critical. In this paper, we introduce a novel approach to improve attack detection at application layer by modeling user sessions as a sequence of events instead of analyzing every single event in isolation. We also argue that combining application access logs and the corresponding data access logs to generate unified logs eliminates the need to analyze them separately thereby resulting in an efficient and accurate system. We evaluate various methods such as conditional random fields, support vector machines, decision trees and naive Bayes, and experimental results show that our approach based on conditional random fields is feasible and can detect attacks at an early stage even when they are disguised within normal events.
What problem does this paper attempt to address?