Unlock instant, AI-driven research and patent intelligence for your innovation.

Injection Attack Detection Method Based on Gated Recurrent Unit and Attention Mechanism

A technique of injecting attacks and recurrent units, which is applied in neural learning methods, digital data information retrieval, unstructured text data retrieval, etc., can solve problems such as unmeasurable relationships, poor recognition of attack sentences, etc., and improve generalization performance , Improve the recognition accuracy, improve the effect of recognition accuracy

Active Publication Date: 2021-07-23
长沙市智为信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Both the tree-kernel and word-graph methods combine machine learning, and to a certain extent, consider the contextual relationship between words, but the relationship between words that are far apart cannot be measured, so there is a problem for shorter attack sentences The recognition is accurate, but the recognition effect is not good for long attack sentences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Injection Attack Detection Method Based on Gated Recurrent Unit and Attention Mechanism
  • Injection Attack Detection Method Based on Gated Recurrent Unit and Attention Mechanism
  • Injection Attack Detection Method Based on Gated Recurrent Unit and Attention Mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be further described below in conjunction with a common injection attack—a practical example of SQL injection attack detection.

[0047] Take SQL injection attack detection as an example:

[0048] Using the present invention to realize SQL injection attack detection can be divided into two stages to construct an injection attack detection model. There are two stages: preprocessing stage and training stage. In general, in the preprocessing phase, the input data is preprocessed and formatted for use in the training phase; the process is described in detail below:

[0049] 1. Preprocessing stage

[0050] 1.1 Data Standardization

[0051] In this phase, the data needs to be normalized. Standardize some morphemes (such as reserved words in SQL statements, database table names, special symbols, etc.) in combination with the actual situation of SQL statements, that is, classify according to the standardized word symbol mapping table (that is, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an injection attack detection method based on a gated cyclic unit and an attention mechanism, which is characterized in that it comprises the following steps: Step 1, extracting sentences related to databases in the Internet as samples; preprocessing each sample respectively , and obtain its category label; Step 2, inject the result of the sample preprocessing into the attack detection model, and predict its corresponding category label; where the injection attack detection model includes an activation layer, a gated recurrent unit layer, and an attention Mechanism layer and output layer; step 3, training the injection attack detection model based on sample data; step 4, for the sentence to be detected, first preprocess it, and then input the preprocessed result into the trained injection attack detection model to obtain The category label of the statement to be detected, so as to determine whether the statement to be detected is an injection attack statement. The invention has high accuracy rate.

Description

Background technique [0001] An injection attack is when an attacker injects code into a program or query or injects malware into a computer in order to execute remote commands that can read or modify a database, or change data on a website. Common injection attacks in cyberspace include SQL injection attacks, XSS attacks, etc. According to the 2016 cyberspace security data report, two common injection attacks, SQL injection attack and XSS attack, have become common methods of network attack incidents, causing serious social and economic impacts. [0002] Common defenses against injection attacks include precompiled instructions and dynamic analysis. The detection method of injection attack has changed greatly from the rule-based method in the past to the machine learning-based method today. Representative rule-based methods mainly include methods based on regular expression matching, methods using pre-compiled methods, and methods using proxy server buffering. Although these...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/52G06F16/35G06F16/242G06N3/08
CPCG06F21/52G06N3/084G06F16/2433G06F16/35
Inventor 曹鸣佩赵颖马小龙谢逸航黄惟康占英孙新帅
Owner 长沙市智为信息技术有限公司