Attack data set malicious fragment labeling method and system based on LSTM

An attack data and malicious technology, applied in the field of LSTM-based attack data set malicious segment labeling system

Pending Publication Date: 2021-01-05
北京六方云信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is currently a lack of better automated data labeling methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack data set malicious fragment labeling method and system based on LSTM
  • Attack data set malicious fragment labeling method and system based on LSTM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0047] figure 1 It is a flowchart of an LSTM-based method for labeling malicious fragments in a web attack data set provided by an embodiment of the present invention. Such as figure 1 As shown, the method includes:

[0048] Extract the key value of each set of parameters in the malicious URL;

[0049] converting the key value into a feature representation;

[0050] The feature representation is input into the trained LSTM model for prediction, and the predicted result value with the largest numerical value is obtained;

[0051] The corresponding malicious segment is obtained according to the prediction result value with the largest value, so as to obtain t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack data set malicious fragment labeling method and system based on LSTM. The method comprises the following steps: extracting key values of all groups of parameters in amalicious URL; converting the key values into feature representations; inputting the feature representations into a trained LSTM model, and predicting to obtain a prediction result value with the maximum numerical value; and obtaining a corresponding malicious fragment according to the prediction result value with the maximum numerical value, obtaining the position of the malicious fragment in themalicious URL, and labeling the malicious fragment. The system comprises: a data processing unit used for extracting key values of all groups of parameters in the malicious URL and converting the keyvalues into the feature representations; a data prediction unit used for inputting the feature representations into the trained LSTM model for prediction to obtain the prediction result value with the maximum numerical value; and a data labeling unit used for acquiring the corresponding malicious fragment according to the prediction result value with the maximum numerical value, thereby acquiringthe position of the malicious fragment in the malicious URL and labeling the malicious fragment.

Description

technical field [0001] The invention relates to the technical field of network and information security, in particular to an LSTM-based method for marking malicious fragments of an attack data set and an LSTM-based system for marking malicious fragments of an attack data set. Background technique [0002] Web firewall is the first line of defense for information security. With the rapid update of network technology, new hacking techniques emerge in an endless stream, which brings challenges to traditional rule firewalls. Traditional web intrusion detection technology intercepts intrusion access by maintaining rule sets. However, hard rules are easily bypassed by flexible hackers, and rule sets based on previous knowledge are difficult to deal with 0day attacks. Attacks such as SQL injection and command injection pose a great threat to data security. In order to detect web attacks on a website, it is necessary to extract website traffic and analyze and detect the traffic. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06N3/04G06N3/08
CPCG06F21/562G06N3/049G06N3/08G06N3/045
Inventor 安韬王智民
Owner 北京六方云信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products