Web attack detection method based on HTTP (Hyper Text Transport Protocol) request text and related equipment

An attack detection and text technology, applied in the field of network security, can solve the problems affecting the accuracy rate and true positive rate of the model, the accuracy rate and true positive rate are not high, and the focus processing ability is not strong, so as to avoid missing attack payloads and improve Accuracy rate and true positive rate, the effect of improving information memory ability and focus analysis ability

Active Publication Date: 2021-11-23
CENTRAL SOUTH UNIVERSITY OF FORESTRY AND TECHNOLOGY
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The information memory ability and focus processing ability of the traditional deep learning detection model are not strong, resulting in low detection accuracy and true positive rate; and URL (Uniform Resource Locator) data is usually used as input data, which may miss the attack payload. Affects the accuracy and true positive rate of the model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web attack detection method based on HTTP (Hyper Text Transport Protocol) request text and related equipment
  • Web attack detection method based on HTTP (Hyper Text Transport Protocol) request text and related equipment
  • Web attack detection method based on HTTP (Hyper Text Transport Protocol) request text and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure is optionally described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0029] It should be noted that, unless otherwise defined, the technical terms or scientific terms used in the embodiments of the present disclosure shall have ordinary meanings understood by those skilled in the art to which the present disclosure belongs. The words "comprising" or "comprising" and other similar words used in the embodiments of the present disclosure mean that the elements or objects appearing before the word cover the elements or objects listed after the word and their equivalents, without excluding other elements or objects . Words such as "connected" or "connected" are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect.

[0030] With...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a Web attack detection method based on an HTTP (Hyper Text Transport Protocol) request text and related equipment. The method comprises the following steps: collecting an HTTP request text in network traffic; the HTTP request text is preprocessed, so that a coding vector is generated; a pre-trained memory focus processing neural network (MFPNN) model is utilized to detect the coding vector to obtain a prediction vector, and the MFPNN model is constructed by combining a bidirectional long short-term memory (BiLSTM) neural network model with a multi-head attention mechanism; and performing calculation based on the prediction vector to obtain a classification result of the Web attack. According to the embodiment of the invention, the accuracy and true positive rate of Web attack detection can be improved.

Description

technical field [0001] The present disclosure relates to the technical field of network security, in particular to a Web (World Wide Web) attack detection method and related equipment based on HTTP (Hyper Text Transfer Protocol, hypertext transfer protocol) request text. Background technique [0002] Severe network attacks often lead to catastrophic data leakage and loss. In order to block attacks on web applications, the first task is to be able to accurately detect web attacks. The information memory ability and focus processing ability of the traditional deep learning detection model are not strong, resulting in low detection accuracy and true positive rate; and URL (Uniform Resource Locator) data is usually used as input data, which may miss the attack payload. Affects the accuracy and true positive rate of the model. Contents of the invention [0003] In view of this, the purpose of this disclosure is to propose a method for detecting web attacks based on HTTP reques...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06N3/04G06N3/08
CPCH04L63/1416H04L63/1433H04L67/02G06N3/08G06N3/044
Inventor 刘拥民黄浩谢铁强
Owner CENTRAL SOUTH UNIVERSITY OF FORESTRY AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products