Increasing time-spent online has amplified users’ exposure to the threat of information leakage.Although existing security systems(such as firewalls and intrusion detection systems) can satisfy most of the security requirements of network administrators,they are not suitable for detecting the activities of applying the HTTP-tunnel technique to steal users’ private information.This paper focuses on a network behavior-based method to address the limitations of the existing protection systems.At first,it analyzes the normal network behavior pattern over HTTP traffic and select four features.Then,it presents an anomaly-based detection model that applies a hierarchical clustering technique and a scoring mechanism.It also uses real-world data to validate that the selected features are useful.The experiments have demonstrated that the model could achieve over 93%hit-rate with only about 3%falsepositive rate.It is regarded confidently that the approach is a complementary technique to the existing security systems.
Increasing time-spent online has amplified users' exposure to tile tilreat oI miormanon leakage. Although existing security systems (such as firewalls and intrusion detection systems) can satisfy most of the security requirements of network administrators, they are not suitable for detecting the activities of applying the HTTP-tunnel technique to steal users' private information. This paper focuses on a network behavior-based method to address the limitations of the existing protection systems. At first, it analyzes the normal network behavior pattern over HTI'P traffic and select four features. Then, it pres- ents an anomaly-based detection model that applies a hierarchical clustering technique and a scoring mechanism. It also uses real-world data to validate that the selected features are useful. The experiments have demonstrated that the model could achieve over 93% hit-rate with only about 3% false- positive rate. It is regarded confidently that the approach is a complementary technique to the existing security systems.