OMRDetector: A Method for Detecting Obfuscated Malicious Requests Based on Deep Learning

被引:0
|
作者
Yang X.-Z. [1 ,2 ]
Peng G.-J. [1 ,2 ]
Luo Y. [1 ,2 ]
Song W.-N. [1 ,2 ]
Zhang J. [1 ,2 ]
Cao F.-T. [1 ,2 ]
机构
[1] Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, Wuhan University, Wuhan
[2] School of Cyber Science and Engineering, Wuhan University, Wuhan
来源
基金
中国国家自然科学基金;
关键词
Anti-obfuscation; Attention mechanism; Bidirectional long and short-term memory; Convolutional neural network; Deep learning; Network security; Obfuscated malicious request detection;
D O I
10.11897/SP.J.1016.2022.02167
中图分类号
学科分类号
摘要
Web malicious request detection aims to identify attacks in the network quickly and accurately. At present, malicious Web requests are complex, heterogeneous, and obfuscated. Conventional detection methods suffer from multiple weaknesses, e.g., depending on experience and rules, easy to be bypassed, high false-positive rates, fail to capture the semantic characteristics of malicious requests. Therefore, they cannot detect unknown network attacks in the first place and deal with obfuscated malicious requests. To this end, this paper designs and applies the three-layer CNN-BiLSTM fusion attention mechanism model to the field of obfuscated malicious request detection for the first time. Also, given the characteristics of obfuscated malicious requests, we optimize and propose an anti-obfuscation malicious request detection model named OMRDetector based on deep learning. This model adopts an anti-obfuscation preprocessing method for the characteristics of malicious requests. It uses a three-layer Convolutional Neural Network(CNN) to obtain the local characteristics of network requests. Then, a Bidirectional Long and Short-Term Memory(BiLSTM) network is designed to capture the long-distance dependence and contextual semantic features of the obfuscated malicious requests. Further, the attention mechanism extracts the key features. Finally, the softmax classifier calculates the detection results of malicious requests to combat obfuscation and detect unknown malicious request attacks. Experimental results show that our model can effectively detect highly stealthy and obfuscated malicious network requests. Compared with the conventional methods, the Precision, Recall, F1-score, and Accuracy are improved, and the corresponding values are 97.734%, 97.737%, 97.735%, and 97.754%. In addition, the OMRDetector model has the lowest number of false negatives(1226) and false positives(1244). The performance is better than conventional machine learning models(including logistic regression, decision tree, naive Bayes, support vector machine, random forest, and AdaBoost) and existing deep learning models(including CNN, TextCNN, LSTM, BiLSTM, and BiLSTM+Attention) in recognition of obfuscated malicious requests. Moreover, this paper combines the characteristics of obfuscated malicious requests and summarizes twelve significant obfuscation types commonly used in malicious request attacks. Such types include case obfuscation, keyword copy obfuscation, comment bypass obfuscation, unique character truncation obfuscation, path bypass obfuscation, URL encoding, particular key word obfuscation, combination rules to bypass logic obfuscation, equivalent function substitution obfuscation, Base64 encoding, DES encryption, and traffic magic change obfuscation. Also, the last two obfuscation types will be used to evaluate the OMRDetector model's ability to detect and confront malicious Web requests of unknown types(no training and learning process). Meanwhile, this paper conducts comparative experiments to verify that the proposed OMRDetector model can detect obfuscated malicious requests better. Finally, the experimental results show that OMRDetector can effectively handle various obfuscation of malicious requests and better perceive unknown network attacks. Therefore, it has promising academic value and applications. © 2022, Science Press. All right reserved.
引用
下载
收藏
页码:2167 / 2189
页数:22
相关论文
共 37 条
  • [1] Yu L, Chen L, Dong J, Et al., Detecting malicious Web requests using an enhanced TextCNN, Proceedings of the 2020 IEEE Annual International Computer Software and Applications Conference(COMPSAC), pp. 768-777, (2020)
  • [2] Ji Tian-Tian, Fang Bin-Xing, Cui Xiang, Et al., Research on deep learning-powered malware attack and defense techniques, Chinese Journal of Computers, 44, 4, pp. 669-695, (2021)
  • [3] Luo B, Xia J., A novel intrusion detection system based on feature generation with visualization strategy, Expert Systems with Applications, 41, 9, pp. 4139-4147, (2014)
  • [4] Sperotto A, Schaffrath G, Sadre R, Et al., An overview of IP flow-based intrusion detection, IEEE Communications Surveys and Tutorials, 12, 3, pp. 343-356, (2010)
  • [5] Denning D E., An intrusion-detection model, IEEE Transactions on Software Engineering, 13, 2, pp. 222-232, (1987)
  • [6] Ma J, Saul L K, Savage S, Et al., Identifying suspicious URLs: An application of large-scale online learning, Proceedings of the 26th International Conference on Machine Learning(ICML), pp. 681-688, (2009)
  • [7] Pan Feng, Ding Yun-Fei, Wang Wei-Nong, Anomaly detection techniques based on statistics, Journal of Shanghai Jiaotong University, 38, pp. 204-207, (2004)
  • [8] Borders K, Springer J, Burnside M., Chimera: A declarative language for streaming network traffic analysis, Proceedings of the 21st USENIX Security Symposium, pp. 365-379, (2012)
  • [9] Li H, Hu H, Gu G, Et al., vNIDS: Towards elastic security with safe and efficient virtualization of network intrusion detection systems, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security(CCS), pp. 17-34, (2018)
  • [10] Abbes T, Bouhoula A, Rusinowitch M., Efficient decision tree for protocol analysis in intrusion detection, International Journal of Security and Networks, 5, 4, pp. 220-235, (2010)