Unlock instant, AI-driven research and patent intelligence for your innovation.

Transformer-based application layer malicious payload detection method, system, device and medium

A technology of payload and detection method, applied in neural learning methods, instruments, biological neural network models, etc., can solve the problems of non-convergence of models and loss of detailed information, and achieve the effect of accurate load detection and fast convergence

Active Publication Date: 2022-05-17
长沙市智为信息技术有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the feature extraction method (multi-layer convolution and pooling operation) of image target detection is used, a large amount of detailed information will be lost, which will eventually cause the model to not converge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transformer-based application layer malicious payload detection method, system, device and medium
  • Transformer-based application layer malicious payload detection method, system, device and medium
  • Transformer-based application layer malicious payload detection method, system, device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] as attached figure 1 As shown, this embodiment discloses a Transformer-based application-layer malicious payload detection method, and its implementation of application-layer malicious payload detection includes two stages, namely the construction stage and the detection stage. In the construction phase, data preprocessing is first performed on application layer user requests with malicious payload information, and then a Transformer-based application layer malicious payload detection model is constructed and trained; in the detection phase, data preprocessing is first performed on application layer user requests to be detected, Then use the trained model for malicious payload detection. Below, the above two stages will be described in detail:

[0060] 1. Construction phase

[0061] 1. Data acquisition and labeling

[0062] Obtain application layer user request data through enterprise cooperation, experimental simulation, etc., and use manual marking or other methods...

Embodiment 2

[0122] This embodiment discloses a Transformer-based application layer malicious payload detection system, including:

[0123] The sample set building module is used to: construct the application layer user request sample set D, wherein each sample d i Include an application layer user request x i and its malicious payload information, which includes one or more groups of specific malicious payloads p ij and its class y ij ;The subscript i is used to distinguish different application layer user requests, and the subscript j is used to distinguish different types of malicious payloads;

[0124] The data preprocessing module is used to: convert the application layer user request sample d in D i Carry out data preprocessing to obtain a number of words composed user request and the class-true label of each lemma The l in the subscript is used to distinguish different lexical units;

[0125] The detection model training module is used for: preprocessing the data in the ap...

Embodiment 3

[0129] This embodiment discloses an electronic device, including a processor and a memory, where a computer program is stored in the memory, and when the computer program is executed by the processor, the processor implements the method described in Embodiment 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Transformer-based application layer malicious payload detection method, system, device and medium, the method comprising: constructing an application layer user request sample set, each sample including an application layer user request and its malicious payload information , the malicious payload information includes one or more groups of specific malicious payloads and their categories; data preprocessing is performed on the sample set to obtain the user request and the true category label of each word; use the preprocessed sample set to train the pre-built Transformer's deep neural network model; use the trained model to predict the malicious payload category of each token in the application layer user request to be detected; finally merge consecutive tokens of the same category to determine the malicious payload in the user request information. The invention can accurately and effectively detect the malicious payload information in the application layer user request.

Description

technical field [0001] The invention belongs to the technical field of computer information processing, and relates to a Transformer-based application layer malicious payload detection method and system. . Background technique [0002] With the rapid development of the mobile Internet, online services have become the favored service method of the people. Network application services such as online government affairs, remote consultation, and e-commerce have made people's lives more and more convenient. While network services are booming, security issues cannot be underestimated. Since 2020, data leakage security incidents such as personal privacy, business secrets, and intellectual property rights have occurred frequently. Attackers attack network applications by constructing malicious requests at the application layer to gain control of the application server and user data in it, thereby seeking illegitimate benefits. [0003] Malicious payloads are a key component of cy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06K9/62G06N3/04G06N3/08
CPCG06F21/562G06N3/08G06N3/045G06F18/214
Inventor 黄惟康占英马小龙王菡赵颖王心远胡坤霖
Owner 长沙市智为信息技术有限公司