All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Security Monitoring of HTTP Traffic Using Extended Flows

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14610%2F15%3A00083044" target="_blank" >RIV/00216224:14610/15:00083044 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1109/ARES.2015.42" target="_blank" >http://dx.doi.org/10.1109/ARES.2015.42</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/ARES.2015.42" target="_blank" >10.1109/ARES.2015.42</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Security Monitoring of HTTP Traffic Using Extended Flows

  • Original language description

    In this paper, we present an analysis of HTTP traffic in a large-scale environment which uses network flow monitoring extended by parsing HTTP requests. In contrast to previously published analyses, we were the first to classify patterns of HTTP trafficwhich are relevant to network security. We described three classes of HTTP traffic which contain brute-force password attacks, connections to proxies, HTTP scanners, and web crawlers. Using the classification, we were able to detect up to 16 previously undetectable brute-force password attacks and 19 HTTP scans per day in our campus network. The activity of proxy servers and web crawlers was also observed. Symptoms of these attacks may be detected by other methods based on traditional flow monitoring, but detection using the analysis of HTTP requests is more straightforward. We, thus, confirm the added value of extended flow monitoring in comparison to the traditional method.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2015

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    2015 10th International Conference on Availability, Reliability and Security

  • ISBN

    9781467365901

  • ISSN

  • e-ISSN

  • Number of pages

    8

  • Pages from-to

    258-265

  • Publisher name

    IEEE

  • Place of publication

    Toulouse

  • Event location

    Toulouse

  • Event date

    Jan 1, 2015

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article