Show simple item record

Detecting web attacks with end-to-end deep learning

dc.contributor.authorPan, Yao
dc.contributor.authorSun, Fangzhou
dc.contributor.authorTeng, Zhongwei
dc.contributor.authorWhite, Jules
dc.contributor.authorSchmidt, Douglas C.
dc.contributor.authorStaples, Jacob
dc.contributor.authorKrause, Lee
dc.date.accessioned2020-07-21T20:45:46Z
dc.date.available2020-07-21T20:45:46Z
dc.date.issued2019-08-27
dc.identifier.citationPan, Y., Sun, F., Teng, Z. et al. Detecting web attacks with end-to-end deep learning. J Internet Serv Appl 10, 16 (2019). https://doi.org/10.1186/s13174-019-0115-xen_US
dc.identifier.issn1867-4828
dc.identifier.urihttp://hdl.handle.net/1803/10225
dc.description.abstractWeb applications are popular targets for cyber-attacks because they are network-accessible and often contain vulnerabilities. An intrusion detection system monitors web applications and issues alerts when an attack attempt is detected. Existing implementations of intrusion detection systems usually extract features from network packets or string characteristics of input that are manually selected as relevant to attack analysis. Manually selecting features, however, is time-consuming and requires in-depth security domain knowledge. Moreover, large amounts of labeled legitimate and attack request data are needed by supervised learning algorithms to classify normal and abnormal behaviors, which is often expensive and impractical to obtain for production web applications. This paper provides three contributions to the study of autonomic intrusion detection systems. First, we evaluate the feasibility of an unsupervised/semi-supervised approach for web attack detection based on the Robust Software Modeling Tool (RSMT), which autonomically monitors and characterizes the runtime behavior of web applications. Second, we describe how RSMT trains a stacked denoising autoencoder to encode and reconstruct the call graph for end-to-end deep learning, where a low-dimensional representation of the raw features with unlabeled request data is used to recognize anomalies by computing the reconstruction error of the request data. Third, we analyze the results of empirically testing RSMT on both synthetic datasets and production applications with intentional vulnerabilities. Our results show that the proposed approach can efficiently and accurately detect attacks, including SQL injection, cross-site scripting, and deserialization, with minimal domain knowledge and little labeled training data.en_US
dc.language.isoen_USen_US
dc.publisherJournal of Internet Services and Applicationsen_US
dc.rightsOpen Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
dc.source.urihttps://jisajournal.springeropen.com/articles/10.1186/s13174-019-0115-x
dc.subjectWeb securityen_US
dc.subjectDeep learningen_US
dc.subjectApplication instrumentationen_US
dc.titleDetecting web attacks with end-to-end deep learningen_US
dc.typeArticleen_US
dc.identifier.doi10.1186/s13174-019-0115-x


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record