Anomaly-Based Web Attack Detection: A Deep Learning Approach

被引:45
|
作者
Liang, Jingxi [1 ]
Zhao, Wen [1 ]
Ye, Wei [1 ]
机构
[1] Peking Univ, Beijing 100871, Peoples R China
关键词
web security; HTTP requests; anomaly detection; deep learning; recurrent neural network;
D O I
10.1145/3171592.3171594
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the era of cloud technology arises, more and more people are beginning to migrate their applications and personal data to the cloud. This makes web-based applications an attractive target for cyber-attacks. As a result, web-based applications now need more protections than ever. However, current anomaly-based web attack detection approaches face the difficulties like unsatisfying accuracy and lack of generalization. And the rule-based web attack detection can hardly fight unknown attacks and is relatively easy to bypass. Therefore, we propose a novel deep learning approach to detect anomalous requests. Our approach is to first train two Recurrent Neural Networks (RNNs) with the complicated recurrent unit (LSTM unit or GRU unit) to learn the normal request patterns using only normal requests unsupervisedly and then supervisedly train a neural network classifier which takes the output of RNNs as the input to discriminate between anomalous and normal requests. We tested our model on two datasets and the results showed that our model was competitive with the state-of-the-art. Our approach frees us from feature selection. Also to the best of our knowledge, this is the first time that the RNN is applied on anomaly-based web attack detection systems.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [1] Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques
    Agostinello, Davide
    Genovese, Angelo
    Piuri, Vincenzo
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 267 - 275
  • [2] Collaborative anomaly-based attack detection
    Gamer, Thomas
    Scharf, Michael
    Schoeller, Marcus
    [J]. SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2007, 4725 : 280 - +
  • [3] An anomaly-based approach for DDoS attack detection in cloud environment
    Rawashdeh, Adnan
    Alkasassbeh, Mouhammd
    Al-Hawawreh, Muna
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2018, 57 (04) : 312 - 324
  • [4] Optimizing anomaly-based attack detection using classification machine learning
    Gouda, Hany Abdelghany
    Ahmed, Mohamed Abdelslam
    Roushdy, Mohamed Ismail
    [J]. NEURAL COMPUTING & APPLICATIONS, 2024, 36 (06): : 3239 - 3257
  • [5] Optimizing anomaly-based attack detection using classification machine learning
    Hany Abdelghany Gouda
    Mohamed Abdelslam Ahmed
    Mohamed Ismail Roushdy
    [J]. Neural Computing and Applications, 2024, 36 : 3239 - 3257
  • [6] On the effects of learning set corruption in anomaly-based detection of web defacements
    Medvet, Eric
    Bartoli, Alberto
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2007, 4579 : 60 - +
  • [7] Swaddler: An approach for the anomaly-based detection of state violations in web applications
    Cova, Marco
    Balzarotti, Davide
    Felmetsger, Viktoria
    Vigna, Giovanni
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2007, 4637 : 63 - +
  • [8] A Deep Learning Approach for Anomaly-Based Network Intrusion Detection Systems: A Survey and an Objective Comparison
    Kumar, Shailender
    Jha, Namrata
    Sachdeva, Nikhil
    [J]. MACHINE LEARNING AND BIG DATA ANALYTICS (PROCEEDINGS OF INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND BIG DATA ANALYTICS (ICMLBDA) 2021), 2022, 256 : 227 - 235
  • [9] Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
    Mohammadi, Shahriar
    Namadchian, Amin
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (01): : 44 - 54
  • [10] An anomaly-based Network Intrusion Detection System using Deep learning
    Nguyen Thanh Van
    Tran Ngoc Thinh
    Le Thanh Sach
    [J]. 2017 INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND ENGINEERING (ICSSE), 2017, : 210 - 214