信息安全研究 ›› 2020, Vol. 6 ›› Issue (12): 1127-1132.

• 技术应用 • 上一篇    下一篇

基于云计算和深度学习的协议监测系统设计

雷惊鹏   

  1. 安徽国防科技职业学院
  • 收稿日期:2020-12-07 出版日期:2020-12-08 发布日期:2020-12-08
  • 通讯作者: 雷惊鹏
  • 作者简介:雷惊鹏,副教授,主要研究方向为信息安全技术、云计算技术. ahgfljp@126.com

Design of Protocol Monitoring System Based on Cloud Computing and Deep Learning

  • Received:2020-12-07 Online:2020-12-08 Published:2020-12-08

摘要: 各类Web应用的发展,使得HTTP协议应用范围不断扩大.由于Web技术的灵活性、多样性特征,针对Web应用的新的攻击方法也在不断产生和演变.类似XSS跨站脚本攻击、数据库注入攻击等恶意行为越来越多地体现在HTTP请求中.传统安全防御体系无时无刻不在应对新的挑战.为了应对Web安全新变化,本文提出建立HTTP协议安全监测模型、针对模型进行分类算法训练、检测HTTP访问数据类别的方法.结合恶意行为在HTTP请求中形式多变、恶意特征路径多变、监测存在难度的特点,探索利用云计算机技术分析HTTP请求格式和恶意特征,自动生成敏感词数据库,通过基于信息熵的特征选择算法,结合深度学习技术设计分类算法训练安全检测模型,进而提出改进HTTP协议安全的监测系统.

关键词: 云计算, 深度学习, 协议, 监测系统, 恶意代码

Abstract: The development of various types of web applications has enabled the application range of the HTTP protocol to continue to expand. Due to the flexibility and diversity of Web technologies, new attack methods for Web applications are constantly evolving and evolving. Malicious behaviors such as XSS cross-site scripting attacks and database injection attacks are increasingly reflected in HTTP requests. The traditional security defense system responds to new challenges all the time.In order to cope with the new changes of Web security, this paper proposes a method to establish the HTTP protocol security monitoring model, the classification algorithm training for the model, and the detection of HTTP access data categories. Combining the characteristics of malicious behavior in HTTP request, the change of malicious feature path, and the difficulty of monitoring, explore the use of cloud computer technology to analyze HTTP request format and malicious features, automatically generate sensitive word database, and adopt feature entropy-based feature selection algorithm. In combination with deep learning technology, the classification algorithm is trained to train the security detection model, and then a monitoring system for improving the security of the HTTP protocol is proposed.

Key words: cloud computing, deep learning, protocol, monitoring system, malicious code