Supercharge Your Innovation With Domain-Expert AI Agents!

WEB malicious request depth detection system and method based on machine learning

A technology of in-depth detection and machine learning, applied in transmission systems, electrical components, etc., can solve problems such as lack of real-time performance and failure to consider the specificity of different traffic types, so as to facilitate network vulnerability analysis, strong data set adaptability, and The effect of low false detection rate and missed detection rate

Active Publication Date: 2019-03-29
上海视岳计算机科技有限公司
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In view of the above-mentioned defects of the prior art, the technical problem to be solved by the present invention is how to overcome the shortcomings of a single machine learning model that is too broad, without considering the specificity of different traffic types and the lack of real-time performance, and divide the access traffic into intranet WEB According to the characteristics and unique patterns of the traffic of the server access and the traffic of the web server of the external network, as well as the difference in the security level of the internal and external network servers, a targeted and focused detection model is made to realize malicious detection of the gateway. Real-time detection of traffic, and ensure that the system has low false detection rate and missed detection rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WEB malicious request depth detection system and method based on machine learning
  • WEB malicious request depth detection system and method based on machine learning
  • WEB malicious request depth detection system and method based on machine learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following describes several preferred embodiments of the present invention with reference to the accompanying drawings, so as to make the technical content clearer and easier to understand. The present invention can be embodied in many different forms of embodiments, and the protection scope of the present invention is not limited to the embodiments mentioned herein.

[0040] In the drawings, components with the same structure are denoted by the same numerals, and components with similar structures or functions are denoted by similar numerals.

[0041] Such as figure 1 Shown is a schematic diagram of the system structure and workflow of a preferred embodiment of the present invention. The present invention provides a machine learning-based WEB malicious request in-depth detection system, comprising a database module 3, a classifier training module 1, and a flow detection module 2; the database module 3 is configured to store gateway WEB flow data, and the classificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a WEB malicious request depth detection system and method based on machine learning, and relates to the technical field of computer network security. The system comprises a database module, a classifier training module and a traffic detection module; the database module stores gateway WEB traffic data; the classifier training module is configured to perform classification training to obtain a first classifier and a second classifier; and the traffic detection module comprises a regular matching module, an intranet and extranet request classification module, an intranetrequest detection module, and a non-intranet request detection module. The gateway WEB traffic data are subjected to regular matching and traffic category classification processing, then are divided into internet request traffic data and non-intranet request traffic data, wherein the internet request traffic data are sent to the second classifier for detection, the non-intranet request traffic data are sent into the first classifier for detection, and detection results are all stored in the database module. According to the WEB malicious request depth detection system based on the machine learning provided by the invention, a multi-model depth detection technology is used, the detection of the malicious traffic of the gateway is successfully realized, and the system has the advantages of being low in fallout ratio and omission ratio, high in data set adaptability and the like.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a machine learning-based deep detection system and method for WEB malicious requests. Background technique [0002] Malicious WEB requests refer to WEB requests used for malicious activities such as stealing information and attacking applications. Malicious WEB requests are concealed and sudden, and there are various attack methods (such as SQL injection, cross-site scripting attacks, etc.), which pose a great threat to network security. Relevant scholars have proposed many schemes to intercept malicious requests, including rule matching technology, simplistic machine learning algorithm detection and other technologies, but all have their own limitations. [0003] The traditional rule matching technology can only be used to detect known types of attacks. It has weak resistance to the ever-changing malicious requests and is easy to be "spoofed" by artificially d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1425H04L67/02
Inventor 邹福泰张庆儒赵铭华张恒瑞张子瑄
Owner 上海视岳计算机科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More