Por favor, use este identificador para citar o enlazar este ítem:
https://hdl.handle.net/20.500.12008/29284
Cómo citar
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Montes, Nicolás | - |
dc.contributor.author | Betarte, Gustavo | - |
dc.contributor.author | Martínez, Rodrigo | - |
dc.contributor.author | Pardo, Alvaro | - |
dc.date.accessioned | 2021-09-01T12:34:47Z | - |
dc.date.available | 2021-09-01T12:34:47Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Montes, N., Betarte, G., Martínez, R. y otros. Web application attacks detection using deep learning [Preprint]. Publicado en : 25th Iberoamerican Congress on Pattern Recognition, 10-13 May 2021 Porto, Portugal. | es |
dc.identifier.uri | https://hdl.handle.net/20.500.12008/29284 | - |
dc.description | 25th Iberoamerican Congress on Pattern Recognition, 10-13 May 2021 Porto, Portugal. | es |
dc.description.abstract | This work investigates the use of deep learning techniques to improve the performance of web application firewalls (WAFs), systems that are used to detect and prevent attacks to web applications. Typically, a WAF inspects the HTTP requests that are exchanged between client and server to spot attacks and block potential threats. We model the problem as a one-class supervised case and build a feature extractor using deep learning techniques. We treat the HTTP requests as text and train a deep language model with a transformer encoder architecture which is a self-attention based neural network. The use of pre-trained language models has yielded significant improvements on a diverse set of NLP tasks because they are capable of doing transfer learning. We use the pre-trained model as a feature extractor to map a http request into a feature vector. These vectors are then used to train a one-class classifier. We also use a performance metric to automatically define an operational point for the one-class model. The experimental results show that the proposed approach outperforms the ones of the classic rule-based MOD- SECURITY configured with a vanilla owasp crs and does not require the participation of a security expert to define the features. | es |
dc.format.extent | 10 p. | es |
dc.format.mimetype | application/pdf | es |
dc.language.iso | en | es |
dc.rights | Las obras depositadas en el Repositorio se rigen por la Ordenanza de los Derechos de la Propiedad Intelectual de la Universidad de la República.(Res. Nº 91 de C.D.C. de 8/III/1994 – D.O. 7/IV/1994) y por la Ordenanza del Repositorio Abierto de la Universidad de la República (Res. Nº 16 de C.D.C. de 07/10/2014) | es |
dc.subject | Web Application Firewall | es |
dc.subject | Anomaly Detection | es |
dc.subject | Deep Learning | es |
dc.title | Web application attacks detection using deep learning | es |
dc.type | Preprint | es |
dc.contributor.filiacion | Montes Nicolás | - |
dc.contributor.filiacion | Betarte Gustavo, Universidad de la República (Uruguay). Facultad de Ingeniería | - |
dc.contributor.filiacion | Martínez Rodrigo, Universidad de la República (Uruguay). Facultad de Ingeniería. | - |
dc.contributor.filiacion | Pardo Alvaro, Universidad Católica del Uruguay. Departamento de Ingeniería Eléctrica, Facultad de Ingeniería y Tecnologías. | - |
dc.rights.licence | Licencia Creative Commons Atribución - No Comercial - Sin Derivadas (CC - By-NC-ND 4.0) | es |
Aparece en las colecciones: | Reportes Técnicos - Instituto de Computación |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | ||
---|---|---|---|---|---|
MBMP21.pdf | Preprint | 535,42 kB | Adobe PDF | Visualizar/Abrir |
Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons