##plugins.themes.bootstrap3.article.main##
Анотація
The possibility of applying machine learning for the classification of malicious requests to a
Web application is considered. This approach excludes the use of deterministic analysis systems (for example, expert systems),
and is based on the application of a cascade of neural networks or perceptrons on an approximate model to the real human
brain. The main idea of the work is to enable to describe complex attack vectors consisting of feature sets, abstract terms for
compiling a training sample, controlling the quality of recognition and classifying each of the layers (networks) participating
in the work, with the ability to adjust not the entire network, but only a small part of it, in the training of which a mistake or
inaccuracy crept in. The design of the developed network can be described as a cascaded, scalable neural network.
When using neural networks to detect attacks on web systems, the issue of vectorization and normalization of features is
acute. The most commonly used methods for solving these problems are not designed for the case of deliberate distortion of
the signs of an attack.
The proposed approach makes it possible to obtain a neural network that has been studied in more detail by small features,
and also to eliminate the normalization issues in order to avoid deliberately bypassing the intrusion detection system. By
isolating one more group of neurons in the network and teaching it to samples containing various variants of circumvention of
the attack classification, the developed intrusion detection system remains able to classify any types of attacks as well as their
aggregates, putting forward more stringent measures to counteract attacks. This allows you to follow the life cycle of the
attack in more detail: from the starting trial attack to deliberate sophisticated attempts to bypass the system and introduce
more decisive measures to actively counteract the attack, eliminating the chances of a false alarm system.
##plugins.themes.bootstrap3.article.details##
Посилання
Smirnov-O. Olshevska – Avtomatyzatsiya tekhnolohichnykh i biznes-protsesiv – 2017.
[2] “Prymenenye neyronnыkh setey dlya zadach klassyfykatsyy,” BaseGroup Labs, 03-Sep-2015. [Online]. Available:
http://www.basegroup.ru/library/analysis/neural/classification/. [Accessed: 22-Sep-2017].
[3] T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient Estimation of Word Representations in Vector
Space,” [1301.3781] Efficient Estimation of Word Representations in Vector Space, 07-Sep-2013. [Online]. Available:
https://arxiv.org/abs/1301.3781. [Accessed: 22-Nov-2017].
[4] “Linguistic Regularities in Continuous Space Word ...” [Online]. Available:
https://www.bing.com/cr?IG=1006D8A5C35A415194DEBE7B7F33A040&CID=35C1D8C68A7764E90514D3848B7
165D5&rd=1&h=1Qu0WYvRDXMIuagLQw8jXrEkYbmBvC3OHhoFqgbG9Tg&v=1&r=https%3a%2f%2fwww.micr
osoft.com%2fen-us%2fresearch%2fwp-content%2fuploads%2f2016%2f02%2frvecs.pdf&p=DevEx,5063.1. [Accessed:
22-Nov-2017].
[5] “A Neural Network Based System for Intrusion Detection and ...” [Online]. Available:
http://www.bing.com/cr?IG=E646E3819ECB40FDBAC3DCF399F2A356&CID=204ACE3E1F7567731AC5C57C1E7
36671&rd=1&h=gUn_pDynoUBWDwwnRLq6FHn0JGnScS60Mz3PoXxcmu8&v=1&r=http%3a%2f%2fresearch.cs.q
ueensu.ca%2f%7emoradi%2f148-04-MM-MZ.pdf&p=DevEx,5065.1. [Accessed: 22-Nov-2017].
[6] “Outside the Closed World: On Using Machine Learning For ...” [Online]. Available:
http://www.bing.com/cr?IG=C7A840A14BB04B4587E5FF73F1CBCE46&CID=1D514BD09BB76BC0011540929AB
16A7B&rd=1&h=sv5NtZNzG8MREQB41ZtwuqqA0Zr7wlU_GyYCpbUlSSM&v=1&r=http%3a%2f%2fwww.utdallas
.edu%2f%7emuratk%2fcourses%2fdmsec_files%2foakland10-ml.pdf&p=DevEx,5063.1. [Accessed: 22-Nov-2017].