DocumentCode
3672862
Title
Security Monitoring of HTTP Traffic Using Extended Flows
Author
Husák;Petr Velan;Jan Vykopal
Author_Institution
Inst. of Comput. Sci., Masaryk Univ., Brno, Czech Republic
fYear
2015
Firstpage
258
Lastpage
265
Abstract
In this paper, we present an analysis of HTTP traffic in a large-scale environment which uses network flow monitoring extended by parsing HTTP requests. In contrast to previously published analyses, we were the first to classify patterns of HTTP traffic which are relevant to network security. We described three classes of HTTP traffic which contain brute-force password attacks, connections to proxies, HTTP scanners, and web crawlers. Using the classification, we were able to detect up to 16 previously undetectable brute-force password attacks and 19 HTTP scans per day in our campus network. The activity of proxy servers and web crawlers was also observed. Symptoms of these attacks may be detected by other methods based on traditional flow monitoring, but detection using the analysis of HTTP requests is more straightforward. We, thus, confirm the added value of extended flow monitoring in comparison to the traditional method.
Keywords
"IP networks","Monitoring","Security","Crawlers","Protocols","Web servers"
Publisher
ieee
Conference_Titel
Availability, Reliability and Security (ARES), 2015 10th International Conference on
Type
conf
DOI
10.1109/ARES.2015.42
Filename
7299924
Link To Document