Web attack detection method and device

An attack detection and intrusion detection technology, applied in the field of network security, can solve the problems of difficulty in ensuring the security of Web services and high maintenance costs, and achieve the effects of reducing misjudgments of missed sets, improving accuracy and reducing costs.

Active Publication Date: 2020-07-03
BEIJING UNIV OF POSTS & TELECOMM
View PDF9 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the embodiment of the present invention is to provide a web attack detection method and device, which is used to solve the problem that the rule base in the web attack detection method in the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web attack detection method and device
  • Web attack detection method and device
  • Web attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0060] Aiming at the problem that the rule base in the prior art Web attack detection method requires professionals to build and maintain the high cost, the embodiment of the present invention provides a Web attack detection method and device, using Web log files as the source of the Web intrusion detection model to be trained. Sample set, and use the sample set to train the Web intrusion detection model to be trained, so that the Web intrusion detection model ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a Web attack detection method and device, and the method comprises the steps: receiving a network Web request which carries a hypertext transfer protocol request format; taking the Web request as the input of a trained Web intrusion detection model; a Web intrusion detection model is trained; outputting a marked detection category corresponding to the Web request; wherein the trained Web intrusion detection model is obtained by training a sample set based on a Web log text; according to the to-be-trained Web intrusion detection model, a sample set of aWeb log text is used as input of the to-be-trained Web intrusion detection model; local features and high-order implicit features of data are extracted through the CNN network layer on the basis of Web log texts, sequence information between contexts in the Web log texts is extracted through the GRU network layer on the basis of the local features and the high-order implicit features, and the sequence information is classified through the full connection layer.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a web attack detection method and device. Background technique [0002] With the development of Internet technology, network Web services have been integrated into all aspects of people's lives, but due to the openness of Web services, they are easily attacked by network hackers, and network security problems arise. Therefore, Web attack detection has become one of the most important means to solve network security problems. [0003] Traditional web attack detection methods mainly detect web attacks by matching keywords or rule bases. Among them, the rule base contains the characteristics and description rules of known attack methods. The main steps of the web attack detection method include: receiving a request, and detecting the attack mode of the request through regular matching of keywords or characteristics and description rules of known attack patterns in a rule ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06N3/04G06N3/08
CPCH04L63/1416H04L63/1425H04L67/02G06N3/08G06N3/045
Inventor 李小勇牛强强
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products