Aplicação combinada do filtro de Bloom com redes neurais recorrentes para detecção de ataques Web

Detalhes bibliográficos
Ano de defesa: 2020
Autor(a) principal: Rego, Richard Caio Silva
Orientador(a): Não Informado pela instituição
Banca de defesa: Não Informado pela instituição
Tipo de documento: Dissertação
Tipo de acesso: Acesso aberto
Idioma: por
Instituição de defesa: Universidade Federal de Santa Maria
Brasil
Ciência da Computação
UFSM
Programa de Pós-Graduação em Ciência da Computação
Centro de Tecnologia
Programa de Pós-Graduação: Não Informado pela instituição
Departamento: Não Informado pela instituição
País: Não Informado pela instituição
Palavras-chave em Português:
Link de acesso: http://repositorio.ufsm.br/handle/1/19784
Resumo: The diversity and complexity of attacks that threaten Web applications have grown in recent years, causing losses for users and owners of these applications. In order to increase security levels, experts have implemented intrusion detection systems to act on the application layer, especially those based on anomalies. Anomaly detection techniques aim to extend security systems by adding alternatives for detecting unknown attacks that would not be discovered by signature-based detection systems. Machine learning methods are widely used in detectors, mainly recurrent neural networks, which have gained great importance in recent years due to their great performance in the task of detecting web attacks. However, research with recurrent networks has focused on increasing the prediction performance of the models. In addition, techniques based on deep learning have shown high computational cost. Therefore, it is necessary to design effective intrusion detection models for the forecasting task, as well as efficient in terms of detection time. In this work, the Bloom Filter was used as a tool to support the detector based on recurrent neural network. The Bloom filter is a more agile tool and acts in the selection of instances, reducing the input data of the neural network. This combination provided a reduction in the average detection time without affecting the detection metrics results of recurring networks. In addition, with the comparative assessment between recurrent networks of the LSTM, BI-LSTM and GRU types, it was possible to evaluate the best variant for the model. The combination of Bloom Filter and Recurrent Neural Network proved to be adequate and effective for detecting attacks against Web applications, presenting a great predictive performance and average detection time when compared to scenarios without the presence of the filter.