Crafting and Detecting Adversarial Web Requests

被引:0
|
作者
Gong, Xinyu [1 ]
Zhu, Huidi [1 ]
Deng, Ruofan [1 ]
Wang, Fu [1 ]
Lu, Jialiang [1 ]
机构
[1] Shanghai Jiao Tong Univ, SPEIT, Shanghai, Peoples R China
关键词
Web Attack; Adversarial Attack; Deep Neural Network; Model Uncertainty; Density Estimation;
D O I
10.1109/SmartCloud.2019.00048
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep learning (DL) techniques have provided state-of-the-art results for many machine learning tasks. In response to the increasing demand for web security, many researchers have been focusing on applying DL to detect web attacks. However, these works just pay attention to the detection accuracy, not the robustness of the detection model itself. In this paper, we proved that it is possible to generate adversarial web requests by modifying only a few characters of them, which can lead the existing DL based model to wrong predictions. The attackers may take this vulnerability to trigger false positive alarms or even disable the whole detection model. As the defensive measure, we propose to use a combined method of kernel density estimation and model uncertainty estimation to detect these adversaries. Through experiment, we report a ROC-AUC of over 95% of detecting these adversarial web requests.
引用
收藏
页码:237 / 242
页数:6
相关论文
共 50 条
  • [1] LogBERT-BiLSTM: Detecting Malicious Web Requests
    Ramos Junior, Levi S.
    Macedo, David
    Oliveira, Adriano L. I.
    Zanchettin, Cleber
    [J]. ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2022, PT III, 2022, 13531 : 704 - 715
  • [2] Detecting Malicious Web Requests Using an Enhanced TextCNN
    Yu, Lian
    Chen, Lihao
    Dong, Jingtao
    Li, Mengyuan
    Liu, Lijun
    Zhao, Bai
    Zhang, Chen
    [J]. 2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 768 - 777
  • [3] Query or Spam: Detecting fraudulent web requests using stream clustering
    Shakiba, Tahere
    Zarifzadeh, Sajjad
    Derhami, Vali
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 853 - 859
  • [4] Crafting universal adversarial perturbations with output vectors
    Kang, Xu
    Song, Bin
    Wang, Dan
    Cai, Xiaohui
    [J]. NEUROCOMPUTING, 2022, 501 : 294 - 305
  • [5] Crafting universal adversarial perturbations with output vectors
    Kang, Xu
    Song, Bin
    Wang, Dan
    Cai, Xiaohui
    [J]. Neurocomputing, 2022, 501 : 294 - 305
  • [6] Crafting Adversarial Examples for Neural Machine Translation
    Zhang, Xinze
    Zhang, Junzhe
    Chen, Zhenhua
    He, Kun
    [J]. 59TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS AND THE 11TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING, VOL 1 (ACL-IJCNLP 2021), 2021, : 1967 - 1977
  • [7] Detecting timed-out client requests for avoiding livelock and improving Web server performance
    Carter, R
    Cherkasova, L
    [J]. ISCC 2000: FIFTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2000, : 2 - 7
  • [8] Classification on Web Application Requests
    Gharibeh, Samar
    Melhem, Shatha
    Najadat, Hassan
    [J]. 2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, : 033 - 037
  • [9] Dynamic prediction of Web requests
    Bonino, D
    Corno, F
    Squillero, G
    [J]. CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 2034 - 2041
  • [10] Crafting Adversarial Input Sequences for Recurrent Neural Networks
    Papernot, Nicolas
    McDaniel, Patrick
    Swami, Ananthram
    Harang, Richard
    [J]. MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 49 - 54