skip to main content
10.1145/1463342.1463350acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

Anomaly detection in the case of message oriented middleware

Published: 02 December 2008 Publication History

Abstract

Message Oriented Middleware (MOM), provides a reliable messaging service and transparent interoperation mechanism for different kinds of distributed web based applications. Different MOMs have also been providing basic security services such as authentication, access control, and communication encryption. These basic security services do not necessarily prevent compromised or malicious clients from delivering attack across MOM platforms. This paper presents our preliminary research on an anomaly detection system to detect attacks that leverage on the messaging service provided by MOM, and other kinds of fault in a domain within MOM.
This system detects anomalies in messages to a client's message queue using a number of different anomaly detection techniques. Through anomalies the system can detect potential attacks or other faults passing through a MOM domain. The system analyzes messages passing to each message queue and derives a client specific profile of normal messages with a range of different features. Utilizing client specific characteristics, the system efficiently provides protection for each client in a MOM domain. The learning approach anomaly detection techniques employed also ensure that the system can be easily adopted by different implementations of MOM systems.

References

[1]
Forrest, S., Hofmeyr, S. A., and Somayaji, 1997. A. Computer immunology. Commun. ACM 40, 10 (Oct. 1997), 88--96.
[2]
Kruegel, C., Vigna, G., Robertson, W. 2005. A Multi-model Approach to the Detection of Web-based Attacks. Computer Networks 48, 5 (August 2005) 717--738.
[3]
Denoyer, L., Gallinari, P., 2004. Bayesian network model for semi-structured document classification, Information Processing and Management, 40(5), 807--827.
[4]
Wang, X., Pan, C., Liu, P., Zhu, S., 2006. SigFree: A Signature-free Buffer Overflow Attack Blocker, Security '06: 15th USENIX Security Symposium (2006) 225--240
[5]
Ernst, M. D., Perkins, J. H., Guo, P. J., McCamant, S., Pacheco, C., Tschantz, M. S., Xiao, C., 2007. The Daikon system for dynamic detection of likely invariants. Science of Computer Programming (2007)
[6]
Chess, D. M., Palmer, C. C., White, S. R., Security in an autonomic computing environment, 2007. IBM SYSTEMS JOURNAL, 42, 1, 107--118
[7]
Forrest, S., Hofmeyr, S. A., Somayaji, A., and Longstaff, T. A. 1996. A sense of self for Unix processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy (Los Alamitos, CA, 1996), 120--128. IEEE Computer Society Press.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MidSec '08: Proceedings of the 2008 workshop on Middleware security
December 2008
48 pages
ISBN:9781605583631
DOI:10.1145/1463342
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 December 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. intrusion detection
  3. message oriented middleware
  4. self-protection

Qualifiers

  • Research-article

Conference

Middleware '08

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Message-oriented Middleware: A Review2019 5th International Conference on Big Data Computing and Communications (BIGCOM)10.1109/BIGCOM.2019.00023(88-97)Online publication date: Aug-2019
  • (2016)A survey of security solutions for distributed publish/subscribe systemsComputers and Security10.1016/j.cose.2016.04.00861:C(94-129)Online publication date: 1-Aug-2016
  • (2015)Monitoring of Client-Cloud InteractionCorrect Software in Web Applications and Web Services10.1007/978-3-319-17112-8_6(177-228)Online publication date: 2015
  • (2013)ABMOM for cross-platform communication in SOA systems2013 International Conference on Research and Innovation in Information Systems (ICRIIS)10.1109/ICRIIS.2013.6716694(107-112)Online publication date: Nov-2013
  • (2011)Enhance Resilience and QoS Awareness in Message Oriented Middleware for Mission Critical ApplicationsProceedings of the 2011 Eighth International Conference on Information Technology: New Generations10.1109/ITNG.2011.120(677-682)Online publication date: 11-Apr-2011
  • (2010)Adding resilience to message oriented middlewareProceedings of the 2nd International Workshop on Software Engineering for Resilient Systems10.1145/2401736.2401747(89-94)Online publication date: 15-Apr-2010
  • (2010)Improving complex distributed software system availability through information hidingProceedings of the 2010 ACM Symposium on Applied Computing10.1145/1774088.1774183(452-456)Online publication date: 22-Mar-2010
  • (2010)Innovations and Advances in Adaptive Secure Message Oriented MiddlewareProceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops10.1109/ICDCSW.2010.70(288-289)Online publication date: 21-Jun-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media