Web Access Behaviour Model for Filtering Out HTTP Automated Software Accessed Domain
Title | Web Access Behaviour Model for Filtering Out HTTP Automated Software Accessed Domain |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Tran, Manh Cong, Nakamura, Yasuhiro |
Conference Name | Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4142-4 |
Keywords | Botnet, botnets, cyber security, HTTP automated software, Human Behavior, malicious detection, Metrics, network security management, pubcrawl, Resiliency, Scalability |
Abstract | In many decades, due to fast growth of the World Wide Web, HTTP automated software/applications (auto-ware) are blooming for multiple purposes. Unfortunately, beside normal applications such as virus defining or operating system updating, auto-ware can also act as abnormal processes such as botnet, worms, virus, spywares, and advertising software (adware). Therefore, auto-ware, in a sense, consumes network bandwidth, and it might become internal security threats, auto-ware accessed domain/server also might be malicious one. Understanding about behaviour of HTTP auto-ware is beneficial for anomaly/malicious detection, the network management, traffic engineering and security. In this paper, HTTP auto-ware communication behaviour is analysed and modeled, from which a method in filtering out its domain/server is proposed. The filtered results can be used as a good resource for other security action purposes such as malicious domain/URL detection/filtering or investigation of HTTP malware from internal threats. |
URL | http://doi.acm.org/10.1145/2857546.2857614 |
DOI | 10.1145/2857546.2857614 |
Citation Key | tran_web_2016 |