comparison of different threshold values for a wavelet
play

Comparison of different threshold values for a wavelet designed - PowerPoint PPT Presentation

Comparison of different threshold values for a wavelet designed attack sensor C. Cappo 1 C. Schaerer 1 A. Kozakevicius 2 R. Ceretta 2 B. Mozaquattro 2 1 Polytechnic School, National University of Asuncin, Paraguay 2 Technology Center Federal


  1. Comparison of different threshold values for a wavelet designed attack sensor C. Cappo 1 C. Schaerer 1 A. Kozakevicius 2 R. Ceretta 2 B. Mozaquattro 2 1 Polytechnic School, National University of Asunción, Paraguay 2 Technology Center Federal University of Santa María, RS, Brasil CNMAC 2012 - XXXIV Congresso Nacional de Matemática Aplicada e Computacional

  2. Introduction Our approach to detect anomalies in web applications The paper proposal work Conclusions and future Work Outline Introduction 1 Motivation Anomaly detection Our approach to detect anomalies in web applications 2 Main characteristics Wavelet Transform Theory Wavelet Algorithm for attack Detection The paper proposal work 3 Our objectives Experiments and Results Conclusions and future Work 4 Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  3. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Outline Introduction 1 Motivation Anomaly detection Our approach to detect anomalies in web applications 2 Main characteristics Wavelet Transform Theory Wavelet Algorithm for attack Detection The paper proposal work 3 Our objectives Experiments and Results Conclusions and future Work 4 Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  4. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Motivation Internet has become a habitual tool used by millions of people in the world. Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  5. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Motivation Internet has become a habitual tool used by millions of people in the world. The use of web applications such as: blogs, news, social networks, webmails, e-commerce , among may others, has become conventional. Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  6. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Motivation Internet has become a habitual tool used by millions of people in the world. The use of web applications such as: blogs, news, social networks, webmails, e-commerce , among may others, has become conventional. To protect these applications from attacks is a critical issue. Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  7. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Motivation Internet has become a habitual tool used by millions of people in the world. The use of web applications such as: blogs, news, social networks, webmails, e-commerce , among may others, has become conventional. To protect these applications from attacks is a critical issue. One form of protection is to use Intrusion Detection System (IDS). Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  8. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Motivation Internet has become a habitual tool used by millions of people in the world. The use of web applications such as: blogs, news, social networks, webmails, e-commerce , among may others, has become conventional. To protect these applications from attacks is a critical issue. One form of protection is to use Intrusion Detection System (IDS). There are two main approaches in detection algorithms IDS design: signature-based and anomaly-based . Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  9. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Motivation Internet has become a habitual tool used by millions of people in the world. The use of web applications such as: blogs, news, social networks, webmails, e-commerce , among may others, has become conventional. To protect these applications from attacks is a critical issue. One form of protection is to use Intrusion Detection System (IDS). There are two main approaches in detection algorithms IDS design: signature-based and anomaly-based . We focus on the design of anomaly-based detection algorithms. Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  10. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Outline Introduction 1 Motivation Anomaly detection Our approach to detect anomalies in web applications 2 Main characteristics Wavelet Transform Theory Wavelet Algorithm for attack Detection The paper proposal work 3 Our objectives Experiments and Results Conclusions and future Work 4 Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  11. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Anomaly-based approach The analysis is based on the observation of any substantial variation of any specific characteristic with respect to the commonly determined behavior. Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  12. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Anomaly-based approach The analysis is based on the observation of any substantial variation of any specific characteristic with respect to the commonly determined behavior. A significant deviation from usual behavior is considered an anomaly, and so an attack. Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  13. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Anomaly-based approach The analysis is based on the observation of any substantial variation of any specific characteristic with respect to the commonly determined behavior. A significant deviation from usual behavior is considered an anomaly, and so an attack. Does not need the knowledge of previous attack pattern. Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  14. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Anomaly-based approach The analysis is based on the observation of any substantial variation of any specific characteristic with respect to the commonly determined behavior. A significant deviation from usual behavior is considered an anomaly, and so an attack. Does not need the knowledge of previous attack pattern. Can potentially detect novel attacks. Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  15. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Anomaly Detection in Web Application In the context of web application this approach has the following advantages: No requirement of a priori knowledge of the web-application. Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  16. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Anomaly Detection in Web Application In the context of web application this approach has the following advantages: No requirement of a priori knowledge of the web-application. Capacity of self adaptation to periodic maintenance of the web applications in focus. Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

  17. Introduction Our approach to detect anomalies in web applications Motivation The paper proposal work Anomaly detection Conclusions and future Work Anomaly Detection in Web Application In the context of web application this approach has the following advantages: No requirement of a priori knowledge of the web-application. Capacity of self adaptation to periodic maintenance of the web applications in focus. Polymorphic and unknown attacks detection capacity. Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend