Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network

被引:2
作者
Jagat, Rikhi Ram [1 ]
Sisodia, Dilip Singh [1 ]
Singh, Pradeep [1 ]
机构
[1] Natl Inst Technol Raipur, Dept Comp Sci & Engn, Raipur 492010, India
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Feature extraction; Anomaly detection; Long short term memory; Security; SQL injection; HTTP; Deep learning; deep learning; deviation network; long short-term memory; variational autoencoder; web attack; weblog; INTRUSION DETECTION; KNOWLEDGE;
D O I
10.1109/TSC.2024.3453748
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web attacks penetrate the web applications' security through unauthorized access to sensitive information, disrupting services, and stealing data. Conventionally, rule-based statistical methods distinguish attackers from legitimate users. However, the training through manually extracted weblog features is time-consuming and requires subject expertise. Additionally, the supervised attack classification method needs massive, labeled weblog data, which is expensive and unfeasible. Also, the unsupervised classification techniques have resolved the labeled data insufficiency problem, but their detection performance is unreliable. Recent studies focus on recognizing web attacks through deep neural network-based anomaly detection. Hence, this study proposes an anomaly detection-based Variational LSTM Autoencoder Deviation Network (VLADEN) for recognizing web attacks from weblogs. This work resolves the aforementioned issues by extracting the aberrant information encoded in weblog request data to detect web attacks. VLADEN works in three stages: data preprocessing, anomaly and reference score generation, and classification. The variational LSTM self-encoding-based reference score generation ensures that the anomaly score deviates from the normal data. The proposed model is experimentally validated on three publicly available datasets (CSIS2010, FWAF, and HTTPParams) and evaluated using AUC-ROC and AUC-PR-based evaluation metrics. The results demonstrate the models' superior performance in detecting attack requests with minimum domain knowledge and labeled data.
引用
收藏
页码:2210 / 2222
页数:13
相关论文
共 59 条
[1]   A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm [J].
Abikoye, Oluwakemi Christiana ;
Abubakar, Abdullahi ;
Dokoro, Ahmed Haruna ;
Akande, Oluwatobi Noah ;
Kayode, Aderonke Anthonia .
EURASIP JOURNAL ON INFORMATION SECURITY, 2020, 2020 (01)
[2]  
Acunetix, 2022, The invicti AppSec indicator 2022
[3]  
AKama, 2022, Sustainability threat report
[4]  
Alaoui Rokia Lamrani, 2022, Procedia Computer Science, P687, DOI 10.1016/j.procs.2022.12.070
[5]   Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review [J].
Alaoui, Rokia Lamrani ;
Nfaoui, El Habib .
FUTURE INTERNET, 2022, 14 (04)
[6]   Effects of cyber security knowledge on attack detection [J].
Ben-Asher, Noam ;
Gonzalez, Cleotilde .
COMPUTERS IN HUMAN BEHAVIOR, 2015, 48 :51-61
[7]  
Chen Z, 2017, IEEE INT CONF BIG DA, P1408, DOI 10.1109/BigData.2017.8258074
[8]  
Cho K., 2014, Journal of Clinical Microbiology, V28, P828, DOI [10.1128/jcm.28.4.828-829.1990, DOI 10.1128/JCM.28.4.828-829.1990]
[9]   Recent advances and applications of deep learning methods in materials science [J].
Choudhary, Kamal ;
DeCost, Brian ;
Chen, Chi ;
Jain, Anubhav ;
Tavazza, Francesca ;
Cohn, Ryan ;
Park, Cheol Woo ;
Choudhary, Alok ;
Agrawal, Ankit ;
Billinge, Simon J. L. ;
Holm, Elizabeth ;
Ong, Shyue Ping ;
Wolverton, Chris .
NPJ COMPUTATIONAL MATERIALS, 2022, 8 (01)
[10]   GAUGING SIMILARITY WITH N-GRAMS - LANGUAGE-INDEPENDENT CATEGORIZATION OF TEXT [J].
DAMASHEK, M .
SCIENCE, 1995, 267 (5199) :843-848