Visible to the public Web Access Behaviour Model for Filtering Out HTTP Automated Software Accessed Domain

TitleWeb Access Behaviour Model for Filtering Out HTTP Automated Software Accessed Domain
Publication TypeConference Paper
Year of Publication2016
AuthorsTran, Manh Cong, Nakamura, Yasuhiro
Conference NameProceedings of the 10th International Conference on Ubiquitous Information Management and Communication
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4142-4
KeywordsBotnet, botnets, cyber security, HTTP automated software, Human Behavior, malicious detection, Metrics, network security management, pubcrawl, Resiliency, Scalability
Abstract

In many decades, due to fast growth of the World Wide Web, HTTP automated software/applications (auto-ware) are blooming for multiple purposes. Unfortunately, beside normal applications such as virus defining or operating system updating, auto-ware can also act as abnormal processes such as botnet, worms, virus, spywares, and advertising software (adware). Therefore, auto-ware, in a sense, consumes network bandwidth, and it might become internal security threats, auto-ware accessed domain/server also might be malicious one. Understanding about behaviour of HTTP auto-ware is beneficial for anomaly/malicious detection, the network management, traffic engineering and security. In this paper, HTTP auto-ware communication behaviour is analysed and modeled, from which a method in filtering out its domain/server is proposed. The filtered results can be used as a good resource for other security action purposes such as malicious domain/URL detection/filtering or investigation of HTTP malware from internal threats.

URLhttp://doi.acm.org/10.1145/2857546.2857614
DOI10.1145/2857546.2857614
Citation Keytran_web_2016