Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Injection attack detection method based on gating cycle unit and attention mechanism

A technology of injecting attack and loop units, applied in neural learning methods, digital data information retrieval, unstructured text data retrieval, etc.

Active Publication Date: 2019-11-05
长沙市智为信息技术有限公司
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Both the tree-kernel and word-graph methods combine machine learning, and to a certain extent, consider the contextual relationship between words, but the relationship between words that are far apart cannot be measured, so there is a problem for shorter attack sentences The recognition is accurate, but the recognition effect is not good for long attack sentences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Injection attack detection method based on gating cycle unit and attention mechanism
  • Injection attack detection method based on gating cycle unit and attention mechanism
  • Injection attack detection method based on gating cycle unit and attention mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be further described below in conjunction with a common injection attack—a practical example of SQL injection attack detection.

[0047] Take SQL injection attack detection as an example:

[0048] Using the present invention to realize SQL injection attack detection can be divided into two stages to construct an injection attack detection model. There are two stages: preprocessing stage and training stage. In general, in the preprocessing phase, the input data is preprocessed and formatted for use in the training phase; the process is described in detail below:

[0049] 1. Preprocessing stage

[0050] 1.1 Data Standardization

[0051] In this phase, the data needs to be normalized. Standardize some morphemes (such as reserved words in SQL statements, database table names, special symbols, etc.) in combination with the actual situation of SQL statements, that is, classify according to the standardized word symbol mapping table (that is, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an injection attack detection method based on a gating loop unit and an attention mechanism, and the method is characterized in that the method comprises the following steps: step 1, extracting a statement related to a database in the Internet as a sample; preprocessing each sample, and obtaining a category label of each sample; step 2, inputting a result after sample preprocessing into an injection attack detection model, and predicting a category label corresponding to the result; wherein the injection attack detection model comprises an activation layer, a gating cycle unit layer, an attention mechanism layer and an output layer which are connected in sequence; step 3, training an injection attack detection model based on the sample data; and step 4, for a to-be-detected statement, preprocessing the to-be-detected statement, and inputting a preprocessing result into the trained injection attack detection model to obtain a category label of the to-be-detectedstatement, thereby judging whether the to-be-detected statement is an injection attack statement or not. The method is high in accuracy.

Description

Background technique [0001] An injection attack is when an attacker injects code into a program or query or injects malware into a computer in order to execute remote commands that can read or modify a database, or change data on a website. Common injection attacks in cyberspace include SQL injection attacks, XSS attacks, etc. According to the 2016 cyberspace security data report, two common injection attacks, SQL injection attack and XSS attack, have become common methods of network attack incidents, causing serious social and economic impacts. [0002] Common defenses against injection attacks include precompiled instructions and dynamic analysis. The detection method of injection attack has changed greatly from the rule-based method in the past to the machine learning-based method today. Representative rule-based methods mainly include methods based on regular expression matching, methods using pre-compiled methods, and methods using proxy server buffering. Although these...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/52G06F16/35G06F16/242G06N3/08
CPCG06F21/52G06N3/084G06F16/2433G06F16/35
Inventor 曹鸣佩赵颖马小龙谢逸航黄惟康占英孙新帅
Owner 长沙市智为信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products