期刊文献+

BiLSTM在跨站脚本检测中的应用研究 被引量:8

Application Research of BiLSTM in Cross-Site Scripting Detection
下载PDF
导出
摘要 目前传统的跨站脚本(XSS)检测技术大多使用机器学习方法,存在代码被恶意混淆导致可读性不高、特征提取不充分并且效率低等缺陷,从而导致检测性能不佳。针对上述问题,提出了使用双向长短时记忆网络检测跨站脚本攻击的方法。首先,对数据进行预处理,使用解码技术将跨站脚本代码还原到未编码状态,从而提高跨站脚本代码的可读性,再使用深度学习工具word2vec将解码后的代码转换为向量作为神经网络的输入;其次,使用双向长短时记忆网络双向学习跨站脚本攻击的抽象特征;最后,使用softmax分类器对学习到的抽象特征进行分类,同时使用dropout算法避免模型出现过拟合。对收集到的数据集进行实验,结果表明,与几种传统机器学习方法和深度学习方法相比,该检测方法表现出更优的检测性能。 At present,machine learning methods are used in the most traditional cross-site scripting(XSS)detection technologies,which have some defects,such as bad readability because of maliciously confused code,insufficient feature extraction and low efficiency,resulting in poor performance.According to these problems,a way used bidirectional long-short term memory(BiLSTM)network is proposed to detect the XSS attack.First,the data need to be preprocessed,the decoding technology is used to restore the XSS codes to the state before encoding to improve the readability,and the deep learning tool word2vec is used to convert the decoded codes into vectors as the input of the neural network.Then,BiLSTM network is used to bilaterally learn the abstract features of the attack.Finally,the softmax classifier is used to classify the learned abstract features and the dropout algorithm is used to avoid over fitting.The experimental results based on the collected datasets show that compared with several traditional machine learning methods and deep learning methods,this method has better detection performance.
作者 程琪芩 万良 CHENG Qiqin;WAN Liang(College of Computer Science and Technology,Guizhou University,Guiyang 550025,China;Institute of Computer Software and Theory,Guizhou University,Guiyang 550025,China)
出处 《计算机科学与探索》 CSCD 北大核心 2020年第8期1338-1347,共10页 Journal of Frontiers of Computer Science and Technology
基金 贵州省科学基金黔科合LH字[2014]No.7634。
关键词 跨站脚本(XSS) 解码技术 word2vec 双向长短时记忆网络(BiLSTM) cross-site scripting(XSS) decoding techniques word2vec bidirectional long-short term memory network(BiLSTM)
  • 相关文献

参考文献1

二级参考文献16

  • 1EMARKETER. Social media [ EB/OL]. [ 2013-01- 24] https:// www. emarketer, com/Coverage/SocialMedia, aspx.
  • 2Symantec.诺顿2012网络安全报告[R/OL].[2013-01-30].http://wenku, it168, com/d_O00529769, shtml.
  • 3HASIB A A. Threats of online soial networks [ J]. IJCSNS Interna- tional Journal of Computer Science and Network Security, 2009, 9 (11): 288-293.
  • 4LIVSHITS V B, CUI W. Spectator: detection and containment of JavaScript worms [ C ]// ATC 2008: Proceedings of the USENIX 2008 Annual Technical Conference on Annual Technical Confer- ence. Berkeley: USENIX Association, 2008:335-348.
  • 5CAO Y, YEGNESWARAN V, POSSAS P, et al. PathCutter: seve- ring the self-propagation path of XSS JavaScript worms in social Web networks[ EB/OL]. [ 2013- 10- 10]. http://www, dnssec-test-dyn. corn/sites/default/files/08_2, pdf.
  • 6TER LOUW M , VENKATAKRISHNAN V N . Blueprint: robust prevention of cross-site scripting attacks for existing browsers[ C]// Proceedings of the 2009 30th IEEE Symposium on Security and Pri- vacy. Piscataway: IEEE Press, 2009:331-346.
  • 7LIKARISH P, JUNG E, JO I. Obfuscated malicious JavaScript de- tection using classification techniques[ C]//Proceedings of the 2009 4th International Conference on Malicious and Unwanted Software. Piscataway: IEEE Press, 2009:47-54.
  • 8NUNAN A E, SOUTO E, dos SANTOS E M, et al. Automatic clas- sification of cross-site scripting in Web pages using document-based and URL-based features[ C]// Proceedings of the 2012 IEEE Sym- posium on Computers and Communications. Piscataway: IEEE Press, 2012:702-707.
  • 9LI W-J, WANG K, STOLFO S J, et al. Fileprints: identifying file types by n-gram analysis[ C}// lAW 2005: Proceedings of the 6th Annual IEEE Systems, Man, and Cybernetics. Piscataway: IEEE Press, 2005:64-71.
  • 10LANZI A, BALZAROTYI D, KRUEGEL C, et al. AccessMiner: using system-centric models for malware protection[ C]// Proceed- ings of the 17th ACM Conference on Computer and Communications Security. New York: ACM Press, 2010:399-412.

共引文献2

同被引文献52

引证文献8

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部