LogBERT-BiLSTM: Detecting Malicious Web Requests

被引:0
|
作者
Ramos Junior, Levi S. [1 ]
Macedo, David [1 ]
Oliveira, Adriano L. I. [1 ]
Zanchettin, Cleber [1 ]
机构
[1] Univ Fed Pernambuco, Centro Informat, BR-50740560 Recife, PE, Brazil
关键词
Web requests; LogBERT-BiLSTM; Attack detection;
D O I
10.1007/978-3-031-15934-3_58
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The digitalization of society potentialized services provided through the Internet, such as information sharing, entertainment, and education. With the rise of end-user services, we also verify the growth of attacks. Unfortunately, most defensive techniques of Web Intrusion Systems cannot deal with the complexity of cyber attacks on HTTP requests. Nevertheless, machine learning approaches are now a promising tool in different areas that can help to detect known and unknown attacks on day zero. We propose a new approach to detect possible attacks on HTTP requests based on machine learning. The new model LogBERTB-iLSTM uses BERT and Bidirectional LSTMs to detect anomalies in data. Experiments compared the proposed approach with literature models on CSIC 2010 and ECML/PKDD 2007 datasets. In addition, we created a new dataset of HTTP requests to evaluate the model performance. The proposed model obtained detection rates consistently above 95% of accuracy on the evaluated datasets.
引用
收藏
页码:704 / 715
页数:12
相关论文
共 50 条
  • [31] Detecting Malicious Packet Losses
    Mizrak, Alper T.
    Savage, Stefan
    Marzullo, Keith
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2009, 20 (02) : 191 - 206
  • [32] Detecting malicious groups of agents
    Braynov, S
    Jadliwala, M
    [J]. 2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 90 - 99
  • [33] Detecting Targeted Malicious Email
    Amin, Rohan M.
    Ryan, Julie J. C. H.
    van Dorp, J. Rene
    [J]. IEEE SECURITY & PRIVACY, 2012, 10 (03) : 64 - 71
  • [34] Detecting Malicious Facebook Applications
    Rahman, Sazzadur
    Huang, Ting-Kai
    Madhyastha, Harsha V.
    Faloutsos, Michalis
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (02) : 773 - 787
  • [35] Detecting of Targeted Malicious Email
    Deshmukh, Priyanka
    Shelar, Megha
    Kulkarni, Nikhil
    [J]. 2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 199 - 202
  • [36] An Approach for Detecting Malicious Keyloggers
    Howard, Adam
    Hu, Yi
    [J]. PROCEEDINGS OF THE 2012 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE (INFOSEC CD '12), 2012, : 53 - 56
  • [37] Detecting and isolating malicious routers
    Mizrak, Alper Tugay
    Cheng, Yu-Chung
    Marzullo, Keith
    Savage, Stefan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (03) : 230 - 244
  • [38] Malicious Base Station and Detecting Malicious Base Station Signal
    Zhang Chen
    [J]. CHINA COMMUNICATIONS, 2014, 11 (08) : 59 - 64
  • [39] Detecting timed-out client requests for avoiding livelock and improving Web server performance
    Carter, R
    Cherkasova, L
    [J]. ISCC 2000: FIFTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2000, : 2 - 7
  • [40] Classification on Web Application Requests
    Gharibeh, Samar
    Melhem, Shatha
    Najadat, Hassan
    [J]. 2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, : 033 - 037