Automation of technological and business processes

ISSN-print: 2312-3125
ISSN-online: 2312-931X
ISO: 26324:2012
Архiви

MACHINE LEARNING IMPLEMENTATION FOR THE CLASSIFICATION OF ATTACKS ON WEB SYSTEMS. PART 2

##plugins.themes.bootstrap3.article.main##

K. Smirnova
A. Smirnov
V. Plotnikov

Анотація

The possibility of applying machine learning for the classification of malicious requests to aWeb application is considered. This approach excludes the use of deterministic analysis systems (for example, expert systems),and is based on the application of a cascade of neural networks or perceptrons on an approximate model to the real humanbrain. The main idea of the work is to enable to describe complex attack vectors consisting of feature sets, abstract terms forcompiling a training sample, controlling the quality of recognition and classifying each of the layers (networks) participatingin the work, with the ability to adjust not the entire network, but only a small part of it, in the training of which a mistake orinaccuracy crept in. The design of the developed network can be described as a cascaded, scalable neural network.When using neural networks to detect attacks on web systems, the issue of vectorization and normalization of features isacute. The most commonly used methods for solving these problems are not designed for the case of deliberate distortion ofthe signs of an attack.The proposed approach makes it possible to obtain a neural network that has been studied in more detail by small features,and also to eliminate the normalization issues in order to avoid deliberately bypassing the intrusion detection system. Byisolating one more group of neurons in the network and teaching it to samples containing various variants of circumvention ofthe attack classification, the developed intrusion detection system remains able to classify any types of attacks as well as theiraggregates, putting forward more stringent measures to counteract attacks. This allows you to follow the life cycle of theattack in more detail: from the starting trial attack to deliberate sophisticated attempts to bypass the system and introducemore decisive measures to actively counteract the attack, eliminating the chances of a false alarm system.
Ключові слова:
Для цієї мови відсутні ключові слова

##plugins.themes.bootstrap3.article.details##

Як цитувати
Smirnova, K., Smirnov, A., & Plotnikov, V. (2017). MACHINE LEARNING IMPLEMENTATION FOR THE CLASSIFICATION OF ATTACKS ON WEB SYSTEMS. PART 2. Automation of Technological and Business Processes, 9(3). https://doi.org/10.15673/atbp.v9i3.713
Розділ
ТЕХНІЧНІ ЗАСОБИ І ІНФОРМАЦІЙНІ ТЕХНОЛОГІЇ У СИСТЕМАХ УПРАВЛІННЯ

Посилання

[1] Machine Learning Implementation For The Classification Of Attacks On Web Systems. Part 1. K. Smirnova-A.
Smirnov-O. Olshevska – Avtomatyzatsiya tekhnolohichnykh i biznes-protsesiv – 2017.
[2] “Prymenenye neyronnыkh setey dlya zadach klassyfykatsyy,” BaseGroup Labs, 03-Sep-2015. [Online]. Available:
http://www.basegroup.ru/library/analysis/neural/classification/. [Accessed: 22-Sep-2017].
[3] T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient Estimation of Word Representations in Vector
Space,” [1301.3781] Efficient Estimation of Word Representations in Vector Space, 07-Sep-2013. [Online]. Available:
https://arxiv.org/abs/1301.3781. [Accessed: 22-Nov-2017].
[4] “Linguistic Regularities in Continuous Space Word ...” [Online]. Available:
https://www.bing.com/cr?IG=1006D8A5C35A415194DEBE7B7F33A040&CID=35C1D8C68A7764E90514D3848B7
165D5&rd=1&h=1Qu0WYvRDXMIuagLQw8jXrEkYbmBvC3OHhoFqgbG9Tg&v=1&r=https%3a%2f%2fwww.micr
osoft.com%2fen-us%2fresearch%2fwp-content%2fuploads%2f2016%2f02%2frvecs.pdf&p=DevEx,5063.1. [Accessed:
22-Nov-2017].
[5] “A Neural Network Based System for Intrusion Detection and ...” [Online]. Available:
http://www.bing.com/cr?IG=E646E3819ECB40FDBAC3DCF399F2A356&CID=204ACE3E1F7567731AC5C57C1E7
36671&rd=1&h=gUn_pDynoUBWDwwnRLq6FHn0JGnScS60Mz3PoXxcmu8&v=1&r=http%3a%2f%2fresearch.cs.q
ueensu.ca%2f%7emoradi%2f148-04-MM-MZ.pdf&p=DevEx,5065.1. [Accessed: 22-Nov-2017].
[6] “Outside the Closed World: On Using Machine Learning For ...” [Online]. Available:
http://www.bing.com/cr?IG=C7A840A14BB04B4587E5FF73F1CBCE46&CID=1D514BD09BB76BC0011540929AB
16A7B&rd=1&h=sv5NtZNzG8MREQB41ZtwuqqA0Zr7wlU_GyYCpbUlSSM&v=1&r=http%3a%2f%2fwww.utdallas
.edu%2f%7emuratk%2fcourses%2fdmsec_files%2foakland10-ml.pdf&p=DevEx,5063.1. [Accessed: 22-Nov-2017].