Word vector webpage intrusion detection method based on semantic analysis

A technology of intrusion detection and semantic analysis, applied in network data retrieval, network data indexing, and other database retrieval, etc., can solve problems such as failure to identify abnormal codes, achieve high recognition accuracy and increase relevance

Pending Publication Date: 2019-08-30
ANHUI UNIVERSITY OF TECHNOLOGY
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Pattern matching technology uses feature codes to detect malware, but cannot identify abnormal codes from the semantic level; heuristic rules refer to a certain characteristic of autono

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Word vector webpage intrusion detection method based on semantic analysis
  • Word vector webpage intrusion detection method based on semantic analysis
  • Word vector webpage intrusion detection method based on semantic analysis

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0033] In order to better understand the technical content of the present invention, specific embodiments are described below in conjunction with the accompanying drawings.

[0034] In this disclosure, various aspects of the present invention are described with reference to the accompanying drawings, in which numerous illustrated embodiments are shown. The embodiments of the present disclosure are not defined to include all aspects of the present invention. It should be understood that the various concepts and embodiments introduced above, as well as those described in more detail below, can be implemented in any of many ways, because the concepts and embodiments disclosed in the present invention are not Limited to any implementation. In addition, some aspects disclosed in the present invention can be used alone or in any appropriate combination with other aspects disclosed in the present invention.

[0035] Based on the prior art, the commonly used pattern matching technology u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a word vector webpage intrusion detection method based on semantic analysis, which relates to the field of webpage attack detection, and comprises the following steps: 1) crawling webpage source codes corresponding to URLs of websites, screening and classifying the webpage source codes and taking the webpage source codes as a training set; 2) extracting Chinese character strings of all webpage source codes in the training set to perform word segmentation processing; 3) respectively carrying out keyword screening on word segmentation processing results and constructing akeyword library; 4) constructing a word vector of the keyword, and performing normalization processing; 5) calculating the weight in combination with the normalized TF-IDF to establish a weight word vector space, 6) training a webpage intrusion detection model, 7) judging whether the webpage to be detected is invaded or not through the model. The invention provides a webpage intrusion detection method for judging whether a webpage is maliciously invaded by vocabularies by utilizing a model.

Description

technical field [0001] The invention relates to the field of web page attack detection, in particular to a word vector web page intrusion detection method based on semantic analysis. Background technique [0002] With the rapid development of the Internet, network security has gradually become a potentially huge problem. Network security is a wide-ranging issue, which also involves the question of whether it constitutes a criminal act. In its simplest form, it is primarily concerned with whether the content of a website has been tampered with. Therefore, the demand for website attack detection is getting higher and higher in daily life. [0003] Currently, common website attack methods include sql injection, xss attack, and csrf attack. Sql injection refers to the code that users inject malicious sql commands into http requests, causing the server to execute malicious sql commands together when using database sql commands. XSS attack, cross-site scripting attack refers t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F17/27G06F16/955G06F16/951G06F16/906
CPCH04L63/1416G06F16/906G06F16/951G06F16/955G06F40/30Y02D10/00
Inventor 王泽鑫吴宣够储昭斌王士帅
Owner ANHUI UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products