Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Authors
Abstract:
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in detecting new attacks. To tackle this problem, various methods of machine learning have been presented in recent years. Since malicious web requests have more delicate distinction than normal requests, these methods have failed to exhibit a good accuracy in new attack detection. This paper presents a new method for web attack detection using seq2seq networks using attention. The results show that this method could predict the possible responses and use the difference from the real responses of the server to model the normal traffic. Thereby, it could use the similarity measure to discriminate between normal and anomalous traffic. The highest accuracy of this method versus similar methods shows that the use of attention mechanism can cope with the challenge of studying long web requests to a great extent.
similar resources
Comparative Analysis of Anomaly Based Web Attack Detection Methods
In the present scenario, protection of websites from web-based attacks is a great challenge due to the bad intention of the malicious user over the Internet. Researchers are trying to find the optimum solution to prevent these web attack activities. There are several techniques available to prevent the web attacks from happening like firewalls, but most of the firewall is not designed to preven...
full textAnomaly-based detection using synergetic neural network
Network traffic anomaly detection has become a popular research tendency, as it can detect new type attacks in real time. However, the network traffic appears as a complex dynamic system, causing by the collaboration of many network factors. Although various methods have been proposed to detect anomalies, they are mostly based on the traditional statistical physics. In these methods, all factor...
full textCollaborative Anomaly-Based Attack Detection
Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such challenges. Anomaly-based systems, however, often show high false negative rates. One reason for this is that detection systems work as single instances that base their decisions on local knowledge only. In this pape...
full textConvolutional Attention-based Seq2Seq Neural Network for End-to-End ASR
Traditional approach in artificial intelligence (AI) have been solving the problem that is difficult for human but relatively easy for computer if it could be formulated as mathematical rules or formal languages. However, their symbol, rule-based approach failed in the problem where human being solves intuitively like image recognition, natural language understanding and speech recognition. The...
full textPedestrian Detection with Deep Convolutional Neural Network
The problem of pedestrian detection in image and video frames has been extensively investigated in the past decade. However, the low performance in complex scenes shows that it remains an open problem. In this paper, we propose to cascade simple Aggregated Channel Features (ACF) and rich Deep Convolutional Neural Network (DCNN) features for efficient and effective pedestrian detection in comple...
full textFlow-based Anomaly Intrusion Detection System Using Neural Network
tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data vectors based on a carefully be using spiking (biologically inspired) Artificial Neural Networks (SANN). neural network is applied to intrusion detection system model in this paper. Experimental improved PSO-BP neural network algorithm flow.
full textMy Resources
Journal title
volume 12 issue 1
pages 44- 54
publication date 2020-01-01
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023