Detection method and system for HTTP malicious traffic

The invention discloses a detection method and system for HTTP malicious traffic, and the method comprises the steps: capturing network traffic data, carrying out the preprocessing of the network traffic data, and obtaining formatted data corresponding to each HTTP request; performing feature extrac...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: WEN JING, XIAO CHONGHUI, JIA ZIXIAO, JIA SHILIN, YAO LI, LOU SHUYI, DONG YUNFEI, ZHANG HUA, ZHANG SHUAI, YAN HANBING, GAO CHUAN, ZHOU YU, LI SHICONG, XU NA, GUO JING, HU JUN, LYU ZHUOHANG, HE NENGQIANG, ZHU TIAN, ZHOU HAO, WEN SENHAO, ZHANG YUPENG, CHANG XIA, LI ZHIHUI, RAO YU, WANG XIAOQUN, MA LIYA, HAN ZHIHUI, XU YUAN, LEI JUN, DI SHAOJIA, CHEN YANG, XU JIAN, WANG SHIWEN, DING LI, LYU ZHIQUAN, WANG QING, ZHU YUNQIAN, LI TING
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The invention discloses a detection method and system for HTTP malicious traffic, and the method comprises the steps: capturing network traffic data, carrying out the preprocessing of the network traffic data, and obtaining formatted data corresponding to each HTTP request; performing feature extraction on the formatted data to obtain text vector features of each piece of formatted data; performing classification detection on the text vector characteristics based on a pre-trained malicious flow detection model to detect an HTTP malicious request; performing similar attack clustering on the HTTP malicious request based on a similar attack clustering algorithm to obtain a cluster; and performing analysis based on the cluster to obtain malicious attack information of the HTTP malicious request. According to the method, the Spark big data analysis engine is used for carrying out feature extraction and conversion on the flow data, and the machine learning and clustering algorithm is used for mining the malicious f