CN109960934A - A kind of malicious requests detection method based on CNN - Google Patents

A kind of malicious requests detection method based on CNN Download PDF

Info

Publication number
CN109960934A
CN109960934A CN201910228412.3A CN201910228412A CN109960934A CN 109960934 A CN109960934 A CN 109960934A CN 201910228412 A CN201910228412 A CN 201910228412A CN 109960934 A CN109960934 A CN 109960934A
Authority
CN
China
Prior art keywords
sample
cnn
malicious requests
model
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910228412.3A
Other languages
Chinese (zh)
Inventor
荣伟
吕锡香
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201910228412.3A priority Critical patent/CN109960934A/en
Publication of CN109960934A publication Critical patent/CN109960934A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Biomedical Technology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Virology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Computer And Data Communications (AREA)

Abstract

The malicious requests detection method based on CNN that the invention discloses a kind of is related to field of information security technology, described based on detection method includes the following steps: 1) to collect sample;2) data prediction;3) CNN model is constructed;4) deployment model;5) it is run on line;6) later maintenance.In order to solve the problems, such as that existing malicious requests detection method causes malicious requests by under-enumeration due to easily there is information loss, each character of inquiry string is indicated by the present invention by using character embedded technology using high dimension vector, and then it is being distinguished in enabling model more accurately and indicating each character under current text environment, information loss can be effectively reduced, solve the problems, such as that existing malicious requests detection method causes malicious requests to be had broad application prospects by under-enumeration due to easily there is information loss.

Description

A kind of malicious requests detection method based on CNN
Technical field
The present invention relates to field of information security technology, specifically a kind of malicious requests detection method based on CNN.
Background technique
Constantly universal and Web service type with network is continuously increased, and the safety of Web service website also becomes outstanding It is important.In order to improve the safety of Web service website, it usually needs detected to various types of malicious requests.
Currently, detecting this problem for malicious requests, the solution of actual use is most or rule-based black List testing mechanism is filtered the forbidden character string of ad hoc rules by the target characters matching technique such as canonical and disliked to reach detection The purpose of meaning request.Although this method can resist the malice Web request of the overwhelming majority, still expose in use Many problems: first, the rule of matching malicious requests key feature needs artificial summary, and this summary is needed based on experience The talent for being well understood by various types malicious requests can sum up applicable key feature;Second, when rule is more, rule The maintenance cost in library be can not ignore;Third, the target character matching technique of present mainstream is canonical matching, and canonical engine Performance is seriously affected, when especially regular more complicated, at this moment will result in unnecessary time delay, this is for Web service It is for quotient and unacceptable.
For the deficiency of the malicious requests detection method of this rule-based blacklist testing mechanism, it is thus proposed that a kind of (wherein SQL injection attack is the one of malice Web request to method based on the detection SQL injection attack of SVM machine learning model Kind), this method converts a digitized feature for the Web request information of user according to the pre-set identification characteristics of model Vector, SVM model calculate the probability that current Web request is SQL injection attack using this feature vector as input.
But there is also following deficiencies in actual use for above-mentioned technical solution: this method obtain digitized feature to Amount need to be but limited due to identification characteristics by pre-set identification characteristics, this process certainly exists the loss of information, into And causes some unknown or carry out encoded malicious requests by under-enumeration.Therefore, a kind of malicious requests based on CNN are designed Detection method, the problem of becoming current urgent need to resolve.
Summary of the invention
The malicious requests detection method based on CNN that the purpose of the present invention is to provide a kind of, to solve above-mentioned background technique The existing malicious requests detection method of middle proposition leads to the problem of malicious requests are by under-enumeration due to easily there is information loss.
To achieve the above object, the invention provides the following technical scheme:
A kind of malicious requests detection method based on CNN, which is characterized in that it the following steps are included:
1) it collects sample: collecting the typical sample for needing the different type malicious requests detected and obtain sample data, remember Record type belonging to obtained sample data and the data;
2) data prediction: sample data is pre-processed;
Wherein, the pretreatment is to arrange the sample data of different type malicious requests and remove redundant data and missing number According to, while the format of the every data of specification;
3) it constructs CNN model: pretreated sample data is extracted into inquiry string, will be looked by character insertion The each character for asking character string is indicated using high dimension vector, then constructs CNN model by convolution, Chi Hualai;
Tensor is converted for digital vectors by using one-hot coding, and does longitudinal convolution with it with multiple filters and transports It calculates to obtain multiple feature vectors in different size, these feature vectors is then changed into a vector using pond, most A malicious requests are calculated by Softmax function afterwards and belong to all kinds of probability;
4) deployment model: deployment CNN model establishes corresponding problem sample database and training sample to Web server Database;
Described problem sample database and training sample database are respectively used to store the lower sample of newfound confidence level Sheet and training sample;By copying the CNN model file of building on the server that need to be used to, and write the journey of calling model Sequence, so that new user requests to call in time after reaching server;(result confidence level is exported to model for problem sample Lower sample), also need to write program and be deposited into database, after manually sorting out, training sample database is added, so as to it is subsequent more New model;
5) it is run on line: receiving user's request and carry out data prediction according to the method for step 2), according to server CNN model calculates pretreated data and outputs results to Web server;
6) it later maintenance: periodically checks problem sample database and checks whether containing exceptional sample;Wherein, the exception Sample can be unknown malicious requests type etc., if checking exceptional sample, instruction is stored in after exceptional sample is sorted out Practice sample database, CNN model in more new line after training under warp, to guarantee the real-time of CNN model on line.
As a further solution of the present invention: in step 1), the typical sample is the allusion quotation for having the type malicious requests The sample of type feature;The collection can take various ways, for example, using web crawlers, open security date set etc..
As further scheme of the invention: in step 2), the redundant data includes duplicate data, host information With routing information data.
As further scheme of the invention: in step 3), the character is embedded as will based on neural network embeding layer Each character is indicated with a high dimension vector, i.e., character is embedded into higher dimensional space;Due to malicious requests character string mainly by Letter, number and spcial character composition, so only need to be encoded all characters to indicate institute with digital vectors with number Some malice samples.
As further scheme of the invention: in step 5), after CNN model outputs results to web server, if mould Type is lower than preset threshold value to the confidence level of current request, then records the output result of current request and model and store to corresponding The problem of sample database.
Compared with prior art, the beneficial effects of the present invention are:
1, maintenance cost of the invention is lower, uses each character of inquiry string by using character embedded technology High dimension vector is indicated, while by the training of training sample, and then is enable model more accurately and indicated that each character is being worked as Inherent difference under preceding text environments, can effectively reduce information loss, solve existing malicious requests detection method due to easy There is information to lose and lead to the problem of malicious requests are by under-enumeration, while detection efficiency with higher.
2, the present invention using the filter in CNN model and requests character string when extracting each type requests feature Digital representation carries out convolution algorithm, and the typical case of each type flaw attack can be automatically extracted by the quantity and size for increasing filter Feature has stronger adaptive ability without removing one feature database of maintenance as conventional method.
Detailed description of the invention
Fig. 1 is the route map of the malicious requests detection method based on CNN.
Fig. 2 is the building flow chart of CNN model in the malicious requests detection method based on CNN.
Specific embodiment
Present invention will be explained in further detail in the following with reference to the drawings and specific embodiments.Following embodiment will be helpful to Those skilled in the art further understands the present invention, but the invention is not limited in any way.It should be pointed out that ability For the those of ordinary skill in domain, without departing from the inventive concept of the premise, various modifications and improvements can be made.These Belong to protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " instruction is described special Sign, entirety, step, operation, the presence of element and/or component, but be not precluded one or more of the other feature, entirety, step, Operation, the presence or addition of element, component and/or its set.
Technical solution of the present invention is described in more detail With reference to embodiment.
Embodiment 1
A kind of malicious requests detection method based on CNN, please refers to Fig. 1-2, specifically includes the following steps:
1) it collects sample: collecting the typical sample for needing the different type malicious requests detected and obtain sample data;Institute Stating typical sample is the sample for having the characteristic feature of the type malicious requests, is had certain representative;
Specifically, different types of malicious requests sample is collected thousands of and obtains sample data, collect means Various ways can be taken, for example, using web crawlers, open security date set etc., the sample data recorded and the number According to affiliated type;
2) data prediction: sample data is pre-processed;The pretreatment is arrangement different type malicious requests Sample data simultaneously removes redundant data and missing data, while the format of the every data of specification;
The pretreatment includes the domain-name information etc. in removal data;Wherein, the sample of different type malicious requests is arranged When data, malicious requests and its affiliated type are a data;
Specifically, the source due to each sample data may be different, the quality of data also can be different, so using sample Removal redundant data and some data (missing data) for not marking affiliated type are needed before data;
The redundant data includes duplicate data, host information and routing information data;Web request includes many portions Point, wherein having host machine part, path sections and inquiry string, inquiry string is used in this embodiment to construct CNN model, so host information and routing information need to remove;
3) it constructs CNN model: pretreated sample data is extracted into inquiry string, will be looked by character insertion The each character for asking character string is indicated using high dimension vector, then constructs CNN model by convolution, Chi Hualai;Wherein, the word Symbol insertion is to be indicated each character with a high dimension vector based on neural network embeding layer, i.e., character is embedded into higher-dimension sky Between;
It should be understood that carrying out the feature of recording different types malicious requests in a mathematical format by using CNN model;It is logical It crosses Softmax function and calculates the probability that a malicious requests belong to different type malicious requests;The building CNN model is to use The typical sample training initial model of different type malicious requests, and training process is to be passed through by a large amount of known type samples The process of back-propagation algorithm computation model parameter, it is specific as shown in Figure 2;
The process of building CNN model is described below with reference to Fig. 2:
Firstly, since the character string of malicious requests is mainly made of letter, number and spcial character, so only needing to own Character encoded with number, i.e., available digital vectors indicate all malice samples;
For example, malicious requests specific for one, the digital vectors after being encoded are denoted as s, it is assumed that this is maliciously asked N character is sought, then s is a n-dimensional vector;S is converted for s by using one-hot coding, S is the tensor of a n row, m column, M is the quantity of all characters herein;Generate initial embeded matrix E (each of the initial embeded matrix E at random by system Character corresponds to a k dimensional vector, the k dimensional vector of all characters and the matrix for constituting m row k column), that E is m row, k is arranged Amount, wherein k is the size of embedded space, belongs to system parameter, can use 128 here, then can calculate tensor X=S*E, X's is big Small is n row, k column;
Secondly, the multiple filters of obtained tensor X and X are done longitudinal convolution algorithm, the filter is substantially It is a l row, the tensor of k column, initial filter is generated at random by system;
Specifically, l can choose according to actual state, the different of l indicate that (filter essence is exactly for filters of different sizes Matrix, size are l row, k column, and k value has determined that when determining embeded matrix E, l herein can value according to the actual situation, Such as: 2,3 or 5 etc. are taken, different values indicates that the size of filter is different, special to extract different size of part Sign), multiple filters are needed in use, now for convenience of stating, taking F is one of filter, and size is l × k, that The convolution algorithm of F and X will obtain a feature vector y, and circular is as follows:
Wherein, yiFor i-th of value of feature vector y, so i is in [0, n-l] interior value;R, c is index class variable;Relu Function is popular activation primitive, mathematic(al) representation are as follows: Relu (x)=max (0, x);
Then, due to using multiple filters, so being obtained multiple in different size after above convolution algorithm The number for obtaining these feature vectors is denoted as p by feature vector, and simple pond can be used, and (pond mode is more, takes here most Big value pond, that is, take the maximum value of each feature vector to represent the vector, realizes the transformation of vector to number, this process has number According to loss, but the robustness for enhancing model is necessary) these feature vectors are changed into the specific calculating of vector a z, z Method are as follows:Wherein, ziFor i-th of value of vector z, yiFor i-th in multiple feature vectors, t To index class variable;
Finally, can calculate current malicious requests by vector z belongs to all kinds of probability, the quantity of type is denoted as c, uses rjTable Show that current request belongs to the probability of jth class, wherein j≤c, then rjCalculation method it is as follows:
Wherein, wI, jFor the weight in this layer of neural network, initial value is by system random initializtion, and Softmax function meter Calculation method are as follows:By the above process, a malicious requests belong to all kinds of probability and can calculate, and Training process is to pass through the process of back-propagation algorithm computation model parameter by a large amount of known type samples, is needed in this model The parameter of calculating has embeded matrix E, the weight parameter w of each filter F and neural networkI, j
4) deployment model: deployment CNN model establishes corresponding problem sample database and training sample to Web server Database;Wherein, described problem sample database and training sample database be respectively used to store newfound confidence level compared with Low sample and training sample;
Specifically, the CNN model file of building is copied on the server that need to be used, and write the journey of calling model Sequence, so that new user requests to call in time after reaching server.(result confidence level is exported to model for problem sample Lower sample), also need to write program and be deposited into database, after manually sorting out, training sample database is added, so as to it is subsequent more New model;
5) it is run on line: receiving user's request and carry out data prediction according to the method for step 2), according to server CNN model calculates pretreated data and outputs results to Web server;
After CNN model returns results to web server, if model is lower than preset threshold to the confidence level of current request Value, then record current request and model outputs results to corresponding problem sample database;
6) it later maintenance: periodically checks problem sample database and checks whether containing exceptional sample;
For example, the exceptional sample can be unknown malicious requests type etc..It, will be abnormal if checking exceptional sample Sample is stored in training sample database after being sorted out, CNN model in more new line after training under warp, to guarantee CNN mould on line The real-time of type;Due in long-term operational process, in fact it could happen that malicious requests of new type or by way of coding Fallacious message is hidden, these situations are all that initial training sample never occurs, cause model that can not make accurate judgement, Cause the confidence level of output insufficient, so needing from these emerging samples to guarantee model operation steady in a long-term Representative sample is selected, and these samples are added in training sample and carry out more new model, to guarantee the fresh of model Degree.
In the present embodiment, a kind of computer readable storage medium is stored thereon with computer program instructions, the program instruction The step of above method is realized when being executed by processor.
Embodiment 2
A kind of malicious requests detection method based on CNN, please refers to Fig. 1-2, collects all kinds of malice that need to be detected first and asks Then the typical sample asked establishes detection model and with the parameter of training sample training pattern as training sample;Then it carries out It is disposed on line, preservation model confidence level lower problem sample while request on line is handled, to hand picking these problems sample After this, it is added into training sample, so as to more new model, makes the change of model adaptation attack method, can be used for solving existing The problem that detection method maintenance cost is higher, matching process efficiency is lower and adaptive ability is not strong.
Specifically, detection method includes the following steps for the malicious requests based on CNN:
1) it collects sample: collecting the typical sample for needing the different type malicious requests detected and obtain sample data, remember Record type belonging to obtained sample data and the data;The typical sample is the characteristic feature for having the type malicious requests Sample;The collection can take various ways, for example, using web crawlers, open security date set etc.;
2) data prediction: sample data is pre-processed;Wherein, the pretreatment is asked to arrange different type malice The sample data asked simultaneously removes redundant data and missing data, while the format of the every data of specification;
3) it constructs CNN model: pretreated sample data is extracted into inquiry string, will be looked by character insertion The each character for asking character string is indicated using high dimension vector, then constructs CNN model by convolution, Chi Hualai;
The character is embedded as indicating each character with a high dimension vector based on neural network embeding layer, i.e., by character It is embedded into higher dimensional space;Since the character string of malicious requests is mainly by letter, number and spcial character composition, so only need to be by institute Some characters are encoded to indicate all malice samples with digital vectors with number;
Tensor is converted for digital vectors by using one-hot coding, and does longitudinal convolution with it with multiple filters and transports It calculates to obtain multiple feature vectors in different size, these feature vectors is then changed into a vector using pond, most A malicious requests are calculated by Softmax function afterwards and belong to all kinds of probability;
4) deployment model: deployment CNN model establishes corresponding problem sample database and training sample to Web server Database;
Described problem sample database and training sample database are respectively used to store the lower sample of newfound confidence level Sheet and training sample;By copying the CNN model file of building on the server that need to be used to, and write the journey of calling model Sequence, so that new user requests to call in time after reaching server;(result confidence level is exported to model for problem sample Lower sample), also need to write program and be deposited into database, after manually sorting out, training sample database is added, so as to it is subsequent more New model;
5) it is run on line: receiving user's request and carry out data prediction according to the method for step 2), according to server CNN model calculates pretreated data and outputs results to Web server;
After CNN model returns results to web server, if model is lower than preset threshold to the confidence level of current request Value, then record current request and model outputs results to corresponding problem sample database;
6) it later maintenance: periodically checks problem sample database and checks whether containing exceptional sample;If checking exception Sample is stored in training sample database after then being sorted out exceptional sample, CNN model in more new line after training under warp, with Guarantee the real-time of CNN model on line;Due in long-term operational process, in fact it could happen that the malicious requests of new type are logical The mode for crossing coding hides fallacious message, these situations are all that initial training sample never occurs, and cause model that can not do Accurately judgement out causes the confidence level of output insufficient, so needing new from these to guarantee model operation steady in a long-term Representative sample is selected in the sample of appearance, and these samples are added in training sample and carry out more new model, to protect The freshness of model of a syndrome.
Present invention has the advantages that maintenance cost of the invention is lower, by using character embedded technology by polling character Each character of string is indicated using high dimension vector, while by the training of training sample, and then keeps model more accurate It is being distinguished in indicating each character under current text environment, information loss can be effectively reduced, existing malice is solved and ask Detection method is asked to lead to the problem of malicious requests are by under-enumeration due to easily there is information loss, while detection with higher is imitated Rate;
The present invention is when extracting each type requests feature, using the number of filter and request character string in CNN model Word indicates progress convolution algorithm, and the typical case that can automatically extract each type flaw attack by the quantity and size for increasing filter is special Sign has stronger adaptive ability without removing one feature database of maintenance as conventional method;
It present invention can be suitably applied to detection and defence of the Web service provider to the malicious requests in mass users request, root According to different testing results, Web server takes different counter-measures to provide safer service.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can for Machine memory, flash memory, read-only memory, programmable read only memory, electrically erasable programmable memory, register etc..
Better embodiment of the invention is explained in detail above, but the present invention is not limited to above-mentioned embodiment party Formula within the knowledge of one of ordinary skill in the art can also be without departing from the purpose of the present invention Various changes can be made.There is no necessity and possibility to exhaust all the enbodiments.And it thus amplifies out apparent Variation or variation be still in the protection scope of this invention.

Claims (5)

1. a kind of malicious requests detection method based on CNN, which is characterized in that it the following steps are included:
1) it collects sample: collecting the typical sample for needing the different type malicious requests detected and obtain sample data;
2) data prediction: sample data is pre-processed;Wherein, the pretreatment is removal redundant data and missing number According to, while the format of the every data of specification;
3) it constructs CNN model: pretreated sample data is extracted into inquiry string, be embedded in by character by inquiry word Each character of symbol string is indicated using high dimension vector, then constructs CNN model by convolution, Chi Hualai;
4) deployment model: deployment CNN model establishes corresponding problem sample database and number of training to Web server According to library;
5) it is run on line: receiving user's request and carry out data prediction according to the method for step 2), according to the CNN mould of server Type calculates pretreated data and outputs results to Web server;
6) it later maintenance: periodically checks problem sample database and checks whether containing exceptional sample.
2. the malicious requests detection method according to claim 1 based on CNN, which is characterized in that in step 1), the allusion quotation Pattern is originally the sample for having the characteristic feature of the type malicious requests.
3. the malicious requests detection method according to claim 2 based on CNN, which is characterized in that described superfluous in step 2) Remainder is according to including duplicate data, host information and routing information data.
4. the malicious requests detection method according to claim 2 based on CNN, which is characterized in that in step 3), the word Symbol is embedded as indicating each character with a high dimension vector based on neural network embeding layer.
5. the malicious requests detection method according to claim 1 to 4 based on CNN, which is characterized in that when CNN model After outputting results to web server, if model is lower than preset threshold value to the confidence level of current request, record current request and The output result of model is simultaneously stored to corresponding problem sample database.
CN201910228412.3A 2019-03-25 2019-03-25 A kind of malicious requests detection method based on CNN Pending CN109960934A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910228412.3A CN109960934A (en) 2019-03-25 2019-03-25 A kind of malicious requests detection method based on CNN

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910228412.3A CN109960934A (en) 2019-03-25 2019-03-25 A kind of malicious requests detection method based on CNN

Publications (1)

Publication Number Publication Date
CN109960934A true CN109960934A (en) 2019-07-02

Family

ID=67024985

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910228412.3A Pending CN109960934A (en) 2019-03-25 2019-03-25 A kind of malicious requests detection method based on CNN

Country Status (1)

Country Link
CN (1) CN109960934A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368291A (en) * 2020-02-28 2020-07-03 山东爱城市网信息技术有限公司 Method and system for realizing honeypot-like defense
CN113821791A (en) * 2020-06-18 2021-12-21 中国电信股份有限公司 Method, system, storage medium and apparatus for detecting SQL injection

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108347430A (en) * 2018-01-05 2018-07-31 国网山东省电力公司济宁供电公司 Network invasion monitoring based on deep learning and vulnerability scanning method and device
US20180365528A1 (en) * 2017-06-14 2018-12-20 International Business Machines Corporation Hieroglyphic feature-based data processing
CN109450845A (en) * 2018-09-18 2019-03-08 浙江大学 A kind of algorithm generation malice domain name detection method based on deep neural network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180365528A1 (en) * 2017-06-14 2018-12-20 International Business Machines Corporation Hieroglyphic feature-based data processing
CN108347430A (en) * 2018-01-05 2018-07-31 国网山东省电力公司济宁供电公司 Network invasion monitoring based on deep learning and vulnerability scanning method and device
CN109450845A (en) * 2018-09-18 2019-03-08 浙江大学 A kind of algorithm generation malice domain name detection method based on deep neural network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WEI RONG: "Malicious Web Request Detection Using Character-level CNN", 《ARXIV》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368291A (en) * 2020-02-28 2020-07-03 山东爱城市网信息技术有限公司 Method and system for realizing honeypot-like defense
CN113821791A (en) * 2020-06-18 2021-12-21 中国电信股份有限公司 Method, system, storage medium and apparatus for detecting SQL injection
CN113821791B (en) * 2020-06-18 2024-07-12 中国电信股份有限公司 Method, system, storage medium and device for detecting SQL injection

Similar Documents

Publication Publication Date Title
CN109302410B (en) Method and system for detecting abnormal behavior of internal user and computer storage medium
CN102591854B (en) For advertisement filtering system and the filter method thereof of text feature
CN109391706A (en) Domain name detection method, device, equipment and storage medium based on deep learning
US20120323866A1 (en) Efficient development of a rule-based system using crowd-sourcing
CN112541476B (en) Malicious webpage identification method based on semantic feature extraction
Liu et al. Exploiting web images for fine-grained visual recognition by eliminating open-set noise and utilizing hard examples
CN113032525A (en) False news detection method and device, electronic equipment and storage medium
WO2022089227A1 (en) Address parameter processing method, and related device
CN109784308A (en) A kind of address error correction method, device and storage medium
CN109960934A (en) A kind of malicious requests detection method based on CNN
CN116451081A (en) Data drift detection method, device, terminal and storage medium
CN113626826A (en) Intelligent contract security detection method, system, equipment, terminal and application
CN117727043A (en) Training and image retrieval methods, devices and equipment of information reconstruction model
CN117370980A (en) Malicious code detection model generation and detection method, device, equipment and medium
CN110851708B (en) Negative sample extraction method, device, computer equipment and storage medium
CN112348318A (en) Method and device for training and applying supply chain risk prediction model
CN116958809A (en) Remote sensing small sample target detection method for feature library migration
CN110929506A (en) Junk information detection method, device and equipment and readable storage medium
CN116483437A (en) Cross-language or cross-library application program interface mapping method based on representation learning
CN109739840A (en) Data processing empty value method, apparatus and terminal device
CN112348041A (en) Log classification and log classification training method and device, equipment and storage medium
CN114124564B (en) Method and device for detecting counterfeit website, electronic equipment and storage medium
CN114584372A (en) Tor website fingerprint identification method based on attention mechanism and LSTM
CN111833171A (en) Abnormal operation detection and model training method, device and readable storage medium
CN112784015A (en) Information recognition method and apparatus, device, medium, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190702