Detecting web attacks with end-to-end deep learning

被引:38
|
作者
Pan, Yao [1 ]
Sun, Fangzhou [1 ]
Teng, Zhongwei [1 ]
White, Jules [1 ]
Schmidt, Douglas C. [1 ]
Staples, Jacob [2 ]
Krause, Lee [2 ]
机构
[1] Vanderbilt Univ, Dept EECS, 221 Kirkland Hall, Nashville, TN 37235 USA
[2] Securboration Inc, Melbourne, FL USA
关键词
Web security; Deep learning; Application instrumentation; INTRUSION DETECTION; NETWORK; PCA;
D O I
10.1186/s13174-019-0115-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web applications are popular targets for cyber-attacks because they are network-accessible and often contain vulnerabilities. An intrusion detection system monitors web applications and issues alerts when an attack attempt is detected. Existing implementations of intrusion detection systems usually extract features from network packets or string characteristics of input that are manually selected as relevant to attack analysis. Manually selecting features, however, is time-consuming and requires in-depth security domain knowledge. Moreover, large amounts of labeled legitimate and attack request data are needed by supervised learning algorithms to classify normal and abnormal behaviors, which is often expensive and impractical to obtain for production web applications. This paper provides three contributions to the study of autonomic intrusion detection systems. First, we evaluate the feasibility of an unsupervised/semi-supervised approach for web attack detection based on the Robust Software Modeling Tool (RSMT), which autonomically monitors and characterizes the runtime behavior of web applications. Second, we describe how RSMT trains a stacked denoising autoencoder to encode and reconstruct the call graph for end-to-end deep learning, where a low-dimensional representation of the raw features with unlabeled request data is used to recognize anomalies by computing the reconstruction error of the request data. Third, we analyze the results of empirically testing RSMT on both synthetic datasets and production applications with intentional vulnerabilities. Our results show that the proposed approach can efficiently and accurately detect attacks, including SQL injection, cross-site scripting, and deserialization, with minimal domain knowledge and little labeled training data.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Deep Learning for Detecting Network Attacks: An End-to-End Approach
    Zou, Qingtian
    Singhal, Anoop
    Sun, Xiaoyan
    Liu, Peng
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 221 - 234
  • [2] Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach
    Zou, Qingtian
    Singhal, Anoop
    Sun, Xiaoyan
    Liu, Peng
    [J]. JOURNAL OF COMPUTER SECURITY, 2022, 30 (04) : 541 - 570
  • [3] Pay attention to raw traces: A deep learning architecture for end-to-end profiling attacks
    Lu X.
    Zhang C.
    Cao P.
    Gu D.
    Lu H.
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (03): : 235 - 274
  • [4] A robust end-to-end deep learning framework for detecting Martian landforms with arbitrary orientations
    Jiang, Shancheng
    Wu, Fan
    Yung, K. L.
    Yang, Yingqiao
    Ip, W. H.
    Gao, Ming
    Foster, James Abbott
    [J]. KNOWLEDGE-BASED SYSTEMS, 2021, 234
  • [5] A robust end-to-end deep learning framework for detecting Martian landforms with arbitrary orientations
    Jiang, Shancheng
    Wu, Fan
    Yung, K.L.
    Yang, Yingqiao
    Ip, W.H.
    Gao, Ming
    Foster, James Abbott
    [J]. Knowledge-Based Systems, 2021, 234
  • [6] End-to-End Deep Learning for Robotic Following
    Pierre, John M.
    [J]. ICMSCE 2018: PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS SYSTEMS AND CONTROL ENGINEERING, 2015, : 77 - 85
  • [7] End-to-End Optimization of Deep Learning Applications
    Sohrabizadeh, Atefeh
    Wang, Jie
    Cong, Jason
    [J]. 2020 ACM/SIGDA INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE GATE ARRAYS (FPGA '20), 2020, : 133 - 139
  • [8] Spline Filters For End-to-End Deep Learning
    Balestriero, Randall
    Cosentino, Romain
    Glotin, Herve
    Baraniuk, Richard
    [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 80, 2018, 80
  • [9] End-to-end deep learning with neuromorphic photonics
    Dabos, G.
    Mourgias-Alexandris, G.
    Totovic, A.
    Kirtas, M.
    Passalis, N.
    Tefas, A.
    Pleros, N.
    [J]. INTEGRATED OPTICS: DEVICES, MATERIALS, AND TECHNOLOGIES XXV, 2021, 11689
  • [10] End-to-end Deep Learning of Optimization Heuristics
    Cummins, Chris
    Petoumenos, Pavlos
    Wang, Zheng
    Leather, Hugh
    [J]. 2017 26TH INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES (PACT), 2017, : 219 - 232