Network attack detection and visual payload labeling technology based on Seq2Seq architecture with attention mechanism

Author:

Shi Fan1,Zhu Pengcheng2,Zhou Xiangyu3,Yuan Bintao1,Fang Yong3ORCID

Affiliation:

1. College of Electronic Engineering, National University of Defense Technology, Hefei, China

2. College of Electronics and Information Engineering, Sichuan University, Chengdu, China

3. College of Cybersecurity, Sichuan University, Chengdu, China

Abstract

In recent years, Internet of things (IoT) devices are playing an important role in business, education, medical as well as in other fields. Devices connected to the Internet is much more than the number of world population. However, it may face all kinds of attacks from the Internet easily for its accessibility. As we all know, most attacks against IoT devices are based on Web applications. So protecting the security of Web services can effectively improve the situation of IoT ecosystem. Conventional Web attack detection methods highly rely on samples, and artificial intelligence detection results are uninterpretable. Hence, this article introduced a supervised detection algorithm based on benign samples. Seq2Seq algorithm is been chosen and applied to detect malicious web requests. Meanwhile, the attention mechanism is introduced to label the attack payload and highlight labeling abnormal characters. The results of experiments show that on the premise of training a benign sample, the precision of proposed model is 97.02%, and the recall is 97.60%. It explains that the model can detect Web attack requests effectively. Simultaneously, the model can label attack payload visually and make the model “interpretable.”

Funder

fundamental research funds for the central universities

National Key Research and Development Program

Publisher

SAGE Publications

Subject

Computer Networks and Communications,General Engineering

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Method for countering strategic attacks in zero-boundary trusted networks;Journal of Computational Methods in Sciences and Engineering;2024-06-17

2. Research on Malicious Software Detection and Clearing Algorithms Based on Artificial Intelligence;2024 International Conference on Electrical Drives, Power Electronics & Engineering (EDPEE);2024-02-27

3. The Detection of Abnormal Behavior in Healthcare IoT Using IDS, CNN, and SVM;Mobile Computing and Sustainable Informatics;2023

4. An electric power forecasting method based on dual time series attention mechanism neural network structure;2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C);2021-12

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3