Supercharge Your Innovation With Domain-Expert AI Agents!

FP-tree optimized XSS attack automatic detection method

An automatic detection and algorithm technology, applied in the field of network security, can solve problems such as being easily bypassed by hackers and low accuracy of model recognition, so as to reduce the false negative rate, improve the recognition rate, and reduce the effect of manual intervention

Pending Publication Date: 2020-10-02
JIANGSU COLLEGE OF INFORMATION TECH
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the prevention of XSS attacks, the traditional method is to use XSS filters to complete the filtering of user input data. This strategy is mainly to continuously update the source addresses containing XSS attacks to the database blacklist, and the blacklist URLs will be denied access by users. This is A static XSS attack prevention method, which is easily bypassed by hackers
[0004] For the data processing flow chart of the traditional SVM classifier, please refer to the appendix figure 2 , the existing method of completing XSS attack detection based on support vector machine SVM performs data cleaning and characterization on normal web access logs and XSS attack logs. In this step, the normal data is marked as 0, and the XSS attack data is marked as 1. Carry out data marking to form a feature data set, pass the model training of the SVM algorithm to the classifier for result detection, and generate a training model. The generated training model can be directly applied to the identification of XSS attacks, because the feature value extraction depends on Past experience, so the accuracy of model recognition is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • FP-tree optimized XSS attack automatic detection method
  • FP-tree optimized XSS attack automatic detection method
  • FP-tree optimized XSS attack automatic detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0040] according to figure 1 Shown, a kind of FP-tree optimized XSS attack automatic detection method of the present invention, its step comprises:

[0041] Step 1: Use the FP-growth algorithm to extract XSS-related features:

[0042] Step 1.1: read the data set for the first time, generate an item header table, read the data set for the second time, and process the data set, specifically: read the data set for the first time, and generate the items that appear in the data set Count the frequencies to get the final frequent item set; remove the frequent item sets that do not meet the minimum support in the frequent item set, and sort the obtained frequent item sets in descending order of support to obtain the item header table; the secon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an FP-tree optimized XSS attack automatic detection method, which comprises the steps of scanning sample data in a data set by using an FP-growth algorithm, and calculating asupport degree and a confidence degree corresponding to each parameter; giving a minimum support degree and a minimum confidence degree; finding out all frequent item set parameters according to the minimum support degree; finding out an association rule according to the minimum confidence coefficient, and extracting XSS features of the frequent item set parameters meeting the association rule; performing feature extraction on the sample data in the database by adopting an SVM classifier to form feature value data, and adding the XSS features into the feature value data of the SVM classifier;and carrying out SVM classification model training through the feature value data of the SVM classifier, generating a trained classification model, and detecting the XSS attack. According to the method, the SVM classifier is optimized based on the correlation analysis algorithm FP-growth, the XSS attack automatic detection is carried out, and the XSS attack detection accuracy is improved.

Description

technical field [0001] The invention relates to the field of network security, in particular to an FP-tree optimized XSS attack automatic detection method. Background technique [0002] Cross-site scripting XSS attack is a common WEB attack. The main types are persistent, non-persistent, and DOM. Attackers usually inject JavaScript, VBScript, ActiveX, or Flash into vulnerable programs to deceive users. When When a user opens a page or link containing malicious code without knowing it, the corresponding malicious code is executed. At this time, the attacker can use this vulnerability to steal the user account and complete illegal transfers, illegal transfers, and web page hanging. Malicious behaviors such as horses and controlling the victim's machine for DDOS attacks, so cross-site scripting (XSS) is a more important node for WEB security. [0003] For the prevention of XSS attacks, the traditional method is to use XSS filters to complete the filtering of user input data. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 华驰鲁志萍李仁杰
Owner JIANGSU COLLEGE OF INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More