首页> 外文学位 >Detection of Malicious Content in JSON Structured Data Using Multiple Concurrent Anomaly Detection Methods.
【24h】

Detection of Malicious Content in JSON Structured Data Using Multiple Concurrent Anomaly Detection Methods.

机译:使用多种并发异常检测方法检测JSON结构化数据中的恶意内容。

获取原文
获取原文并翻译 | 示例

摘要

Web applications and Web services often use a data format known as JavaScript Object Notation (JSON) to exchange information. An attacker can tamper with these exchanges to cause the Web service or application to malfunction in a way that is detrimental to the interests of the owners of the Web application or service. Many such applications or services are involved in processes critical to safety or are vital to business interests. Unfortunately, such critical applications cannot always be relied upon to validate the data sent to them. This creates a need for protection external to the applications themselves. This need has been addressed by researchers in other contexts, but there has been little specific focus on JSON and the use of multiple concurrent anomaly detection methods. Some previously proposed solutions involved the detection of known signatures of attacks, but this reduces the chance that new attacks will be recognized. To increase the ability to detect newly created attacks, this research focuses on anomaly detection using general characteristics, rather than the recognition of specific attacks. The detection method this research employs is the Random Forest ensemble algorithm. Metrics such as Shannon entropy, n-gram analysis, JSON structure similarity, character string length, and JSON attribute values are utilized. A goal of this research was the detection of attacks at a rate at least better than chance expectation. This goal was met and exceeded as experimental results using simulated attacks showed considerably better performance. Furthermore, a mathematical model of the interaction of classifier configuration parameters was developed.
机译:Web应用程序和Web服务通常使用一种称为JavaScript Object Notation(JSON)的数据格式来交换信息。攻击者可以篡改这些交换,从而以有害于Web应用程序或服务所有者利益的方式使Web服务或应用程序发生故障。许多此类应用程序或服务涉及对安全至关重要或对业务利益至关重要的过程。不幸的是,不能总是依靠这样的关键应用程序来验证发送给他们的数据。这就需要在应用程序本身外部进行保护。研究人员已在其他情况下满足了这一需求,但是很少关注JSON和使用多种并发异常检测方法。某些以前提出的解决方案涉及检测攻击的已知特征,但这减少了识别新攻击的机会。为了提高检测新创建攻击的能力,本研究着重于使用常规特征而不是特定攻击的识别进行异常检测。本研究采用的检测方法是随机森林集成算法。利用诸如Shannon熵,n-gram分析,JSON结构相似性,字符串长度和JSON属性值之类的指标。这项研究的目标是至少以高于预期机会的速度检测攻击。由于使用模拟攻击的实验结果显示出更好的性能,因此达到并超过了此目标。此外,建立了分类器配置参数相互作用的数学模型。

著录项

  • 作者

    Miller, Brett N.;

  • 作者单位

    Eastern Michigan University.;

  • 授予单位 Eastern Michigan University.;
  • 学科 Artificial intelligence.;Information science.;Information technology.
  • 学位 Ph.D.
  • 年度 2016
  • 页码 124 p.
  • 总页数 124
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号