• DocumentCode
    394084
  • Title

    On-the-fly intrusion detection for Web portals

  • Author

    Sion, Radu ; Atallah, Mikhail ; Prabhakar, Sunil

  • Author_Institution
    Comput. Sci. & CERIAS, Purdue Univ., West Lafayette, IN, USA
  • fYear
    2003
  • fDate
    28-30 April 2003
  • Firstpage
    325
  • Lastpage
    330
  • Abstract
    Remote access to distributed hyperlinked information proves to be one of the killer applications for computer networks. More and more content in current inter and intranets is available as hyperdata, a form easing its distribution and semantic organization. In the framework of the Internet´s Web-portals and pay-sites, mechanisms for login based on username and password enable the dynamic customization as well as partial protection of the content. In other applications (e.g. commercial intranets) various similar schemes of authentication are deployed. Nevertheless, stolen passwords are an easy avenue to identity theft, in both public and commercial data networks. Once a perpetrator enters a system, assuming an authorized user´s identity, the task of actually detecting this intrusion becomes non-trivial and is often ignored completely. Thus, in addition to the initial authentication step we propose a runtime intrusion detection mechanism, required to maintain a virtually continuous user authentication process and detect identity theft and password misuses. The current paper focuses on designing a pervasive intrusion detection method for hyperdata systems, based on training on and analyzing of access patterns to hyperlinked data, aiming at detecting intruders and raising a red flag at the content provider´s side. Our solution is based on a new technique, on-the-fly adaptive training for normality on streams of data access patterns. This enables runtime intrusion detection through analysis of correlations between current patterns and the adaptive past-knowledge. Such a method is to be used in conjunction with current username-password protection schemes. We introduce the motivation behind our solution, discuss the novel detection and training metrics and propose a real-life deployment design. We implement the main algorithm and perform experiments for assessing its intrusion detection ability, with very encouraging results. We also discuss the deployment of our method for detecting automatic spam-bot accesses.
  • Keywords
    Internet; Web sites; authorisation; hypermedia; information retrieval; intranets; portals; unsolicited e-mail; Internet; Web portals; adaptive training; automatic spam-bot accesses; content provider red flag; data access patterns; distributed hyperlinked information; identity theft; intranets; on-the-fly intrusion detection; pay-sites; pervasive intrusion detection; remote access; runtime intrusion detection mechanism; username-password protection schemes; virtually continuous user authentication; Application software; Authentication; Computer networks; Distributed computing; Internet; Intrusion detection; Pattern analysis; Portals; Protection; Runtime;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology: Coding and Computing [Computers and Communications], 2003. Proceedings. ITCC 2003. International Conference on
  • Print_ISBN
    0-7695-1916-4
  • Type

    conf

  • DOI
    10.1109/ITCC.2003.1197549
  • Filename
    1197549