Performance evaluation of Convolutional Neural Network for web security

被引:12
作者
Jemal, Ines [1 ]
Haddar, Mohamed Amine [2 ]
Cheikhrouhou, Omar [2 ]
Mahfoudhi, Adel [2 ]
机构
[1] Univ Sfax, CES Lab, ENIS, LR11ES49, Sfax 3038, Tunisia
[2] Taif Univ, Coll CIT, Informat Technol Dept, POB 11099, At Taif 21944, Saudi Arabia
关键词
Web security; Web attacks; Deep learning; Machine learning; NATURAL-LANGUAGE;
D O I
10.1016/j.comcom.2021.04.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the daily use of web applications in several critical domains such as banking and online shopping, cybersecurity has become a challenge. Recently, deep learning techniques have achieved promising results and attracted cybersecurity researchers. In this paper, we explore and evaluate deep learning techniques used for the security of web applications. We analyze through experiments the different factors influencing the performance of the Convolutional Neural Network (CNN) technique for web attacks detection. The experiments done in this paper focus on CNN and have three goals. First, we evaluate the performance of different CNN models using two different methods of data input presentation and data input splitting. Second, we study the impact of the different CNN hyper-parameters on the attack detection rate. Third, we select the best deep learning toolbox that will be used in our future proposed detection technique. Through the experiments conducted in this paper, we reveal that an adequate tuning of hyper-parameters and the way of pre-processing data input have a significant impact on the attack detection rate.
引用
收藏
页码:58 / 67
页数:10
相关论文
共 50 条
  • [1] Abdi F. D., 2017, J INT J COMPUTER SCI, V7, P1
  • [2] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data
    Agarap, Abien Fred M.
    [J]. PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018), 2018, : 26 - 30
  • [3] [Anonymous], 2019, ARXIV190104281
  • [4] Baydin AG, 2018, J MACH LEARN RES, V18
  • [5] A Survey of Deep Learning Methods for Cyber Security
    Berman, Daniel S.
    Buczak, Anna L.
    Chavis, Jeffrey S.
    Corbett, Cherita L.
    [J]. INFORMATION, 2019, 10 (04)
  • [6] Collobert R, 2011, J MACH LEARN RES, V12, P2493
  • [7] Cruz RMS, 2011, ARTIFICIAL NEURAL NETWORKS - METHODOLOGICAL ADVANCES AND BIOMEDICAL APPLICATIONS, P45
  • [8] Ding YX, 2016, IEEE IJCNN, P3901, DOI 10.1109/IJCNN.2016.7727705
  • [9] Eyada H., 2015, US Patent App., Patent No. [14/313, 934, 14313934]
  • [10] Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Moschoyiannis, Sotiris
    Janicke, Helge
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50