Detecting web attacks with end-to-end deep learning

IF 2.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Internet Services and Applications Pub Date : 2019-08-27 DOI:10.1186/s13174-019-0115-x
Yao Pan, Fangzhou Sun, Zhongwei Teng, Jules White, Douglas C. Schmidt, Jacob Staples, Lee Krause
{"title":"Detecting web attacks with end-to-end deep learning","authors":"Yao Pan, Fangzhou Sun, Zhongwei Teng, Jules White, Douglas C. Schmidt, Jacob Staples, Lee Krause","doi":"10.1186/s13174-019-0115-x","DOIUrl":null,"url":null,"abstract":"Web applications are popular targets for cyber-attacks because they are network-accessible and often contain vulnerabilities. An intrusion detection system monitors web applications and issues alerts when an attack attempt is detected. Existing implementations of intrusion detection systems usually extract features from network packets or string characteristics of input that are manually selected as relevant to attack analysis. Manually selecting features, however, is time-consuming and requires in-depth security domain knowledge. Moreover, large amounts of labeled legitimate and attack request data are needed by supervised learning algorithms to classify normal and abnormal behaviors, which is often expensive and impractical to obtain for production web applications. This paper provides three contributions to the study of autonomic intrusion detection systems. First, we evaluate the feasibility of an unsupervised/semi-supervised approach for web attack detection based on the Robust Software Modeling Tool (RSMT), which autonomically monitors and characterizes the runtime behavior of web applications. Second, we describe how RSMT trains a stacked denoising autoencoder to encode and reconstruct the call graph for end-to-end deep learning, where a low-dimensional representation of the raw features with unlabeled request data is used to recognize anomalies by computing the reconstruction error of the request data. Third, we analyze the results of empirically testing RSMT on both synthetic datasets and production applications with intentional vulnerabilities. Our results show that the proposed approach can efficiently and accurately detect attacks, including SQL injection, cross-site scripting, and deserialization, with minimal domain knowledge and little labeled training data.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"2 1","pages":"1-22"},"PeriodicalIF":2.4000,"publicationDate":"2019-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"60","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Internet Services and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1186/s13174-019-0115-x","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 60

Abstract

Web applications are popular targets for cyber-attacks because they are network-accessible and often contain vulnerabilities. An intrusion detection system monitors web applications and issues alerts when an attack attempt is detected. Existing implementations of intrusion detection systems usually extract features from network packets or string characteristics of input that are manually selected as relevant to attack analysis. Manually selecting features, however, is time-consuming and requires in-depth security domain knowledge. Moreover, large amounts of labeled legitimate and attack request data are needed by supervised learning algorithms to classify normal and abnormal behaviors, which is often expensive and impractical to obtain for production web applications. This paper provides three contributions to the study of autonomic intrusion detection systems. First, we evaluate the feasibility of an unsupervised/semi-supervised approach for web attack detection based on the Robust Software Modeling Tool (RSMT), which autonomically monitors and characterizes the runtime behavior of web applications. Second, we describe how RSMT trains a stacked denoising autoencoder to encode and reconstruct the call graph for end-to-end deep learning, where a low-dimensional representation of the raw features with unlabeled request data is used to recognize anomalies by computing the reconstruction error of the request data. Third, we analyze the results of empirically testing RSMT on both synthetic datasets and production applications with intentional vulnerabilities. Our results show that the proposed approach can efficiently and accurately detect attacks, including SQL injection, cross-site scripting, and deserialization, with minimal domain knowledge and little labeled training data.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
端到端深度学习检测网络攻击
Web应用程序是网络攻击的热门目标,因为它们可以通过网络访问并且通常包含漏洞。入侵检测系统监视web应用程序,并在检测到攻击企图时发出警报。现有的入侵检测系统通常是从网络数据包或输入的字符串特征中提取特征,这些特征是人工选择的,与攻击分析相关。然而,手动选择特性非常耗时,并且需要深入的安全领域知识。此外,监督学习算法需要大量标记的合法和攻击请求数据来对正常和异常行为进行分类,这对于生产web应用程序来说通常是昂贵且不切实际的。本文对自主入侵检测系统的研究提供了三个贡献。首先,我们评估了基于鲁棒软件建模工具(RSMT)的无监督/半监督web攻击检测方法的可行性,RSMT可以自动监控和表征web应用程序的运行时行为。其次,我们描述了RSMT如何训练堆叠去噪自编码器来编码和重建端到端深度学习的调用图,其中使用带有未标记请求数据的原始特征的低维表示来通过计算请求数据的重建误差来识别异常。第三,我们分析了在合成数据集和具有故意漏洞的生产应用程序上对RSMT进行实证测试的结果。研究结果表明,该方法可以有效、准确地检测SQL注入、跨站脚本和反序列化等攻击,并且只需要很少的领域知识和标记训练数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Internet Services and Applications
Journal of Internet Services and Applications COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
3.70
自引率
0.00%
发文量
2
审稿时长
13 weeks
期刊最新文献
Load Balancing between Paths using Software Defined Networks Predictive Fraud Detection: An Intelligent Method for Internet of Smart Grid Things Systems An Approach to Remote Update Embedded Systems in the Internet of Things NetOr: A Microservice Oriented Inter-Domain Vertical Service Orchestrator for 5G Networks Data Compression in LoRa Networks: A Compromise between Performance and Energy Consumption
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1