Computer Science ›› 2021, Vol. 48 ›› Issue (2): 324-329.doi: 10.11896/jsjkx.200800030

Special Issue: Internet of Things

• Information Security • Previous Articles     Next Articles

IoTGuardEye:A Web Attack Detection Method for IoT Services

LIU Xin, HUANG Yuan-yuan, LIU Zi-ang, ZHOU Rui   

  1. School of Information Science & Engineering,Lanzhou University,Lanzhou 730000,China
  • Received:2020-08-05 Revised:2020-11-25 Online:2021-02-15 Published:2021-02-04
  • About author:LIU Xin,born in 1995,Ph.D student.His main research interests include web security,IoT security and blockchain security.
    ZHOU Rui,born in 1981,associate professor.His main research interests include distributed systems,embedded systems and machine learning.
  • Supported by:
    The National Key R&D Program of China(2020YFC0832500),National Natural Science Foundation of China(61402210),Ministry of Education-China Mobile Research Foundation(MCM20170206) andState Grid Corporation of China Science and Technology Project(SGGSKY00WYJS2000062).

Abstract: In most of the edge computing applications including Internet of Things (IoT) devices,the application programming interface (API) based on Internet application technologies,which are commonly known as Web Technologies,is the core of information interaction between devices and remote servers.Compared with traditional web applications,most users cannot directly access APIs used by edge devices,which makes them suffer fewer attacks.However,with the popularity of edge computing,the attack based on API has gradually become a hot spot.Therefore,this paper proposes a web attack vector detection method for IoT service providers.It can be utilized to detect malicious traffic against its API services and provide security intelligence for the security operation center (SOC).Based on the feature extraction of text sequence requested by hypertext transfer protocol (HTTP),this method combines bidirectional long short-term memory (BLSTM) to detect the attack vector of web traffic according to the relatively fixed format of API request message.Experimental results show that,compared with the rule-based Web application firewall (WAF) and traditional machine learning methods,the proposed method has better recognition ability for attacks on IoT service APIs.

Key words: BLSTM, Edge computing, Internet of Things, Threat awareness, Web attack

CLC Number: 

  • TP393
[1] ALFONSO V,JAMES F H,HUNG L H,et al.Predicts 2015:The Internet of Things[EB/OL].(2014-12-30) [2020-07-28].https:∥www.gartner.com/doc/2952822/predicts-internet-things.
[2] ALAN N,ALEX S,Internet security threat report[EB/OL].(2019-02) [2020-07-28].https:∥symantec.broadcom.com/symc-istr-v24-2019-6819.
[3] WAKEFIELDR L.Computer monitoring and surveillance[J].The CPA Journal,2004,74(7):52.
[4] DENNING D E.An Intrusion-Detection Model[J].IEEE Transactions on Software Engineering,1987,SE-13(2):222-232.
[5] YU F,CHEN Z F,DIAO Y L,et al.Fast and memory-efficient regular expression matching for deep packet inspection[C]//2006 ACM/IEEE symposium on Architecture for networking and communications systems (ANCS'06).2006:93-102.
[6] ROESCH M.Snort - Lightweight Intrusion Detection for Networks[C]// In Proceedings of the 13th USENIX conference on System administration (LISA '99).Association,USA,1999:229-238.
[7] KRUEGEL C,TOTH T.Using Decision Trees to Improve Signature-Based Intrusion Detection[C]//Recent Advances in Intrusion Detection(RAID 2003).Lecture Notes in Computer Science,2003:173-191.
[8] CHEN W H,HSU S H,SHEN H P.Application of SVM and ANN for intrusion detection[J].Computers & Operations Research,2005,32(10):2617-2634.
[9] LIANG J,ZHAO W,YE W.Anomaly-Based Web Attack Detection:A Deep Learning Approach[C]//The 2017 VI International Conference on Network,Communication and Computing (ICNCC 2017).2017:80-85.
[10] SAXE J,BERLIN K.Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features[C]// 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).Fajardo,2015:11-20.
[11] TIAN Z,LUO C,QIU J,et al.A Distributed Deep Learning System for Web Attack Detection on Edge Devices[J].IEEE Transactions on Industrial Informatics,2020,16(3):1963-1971.
[12] TAMA B A,NKENYEREYE L,ISLAM S M R,et al.An Enhanced Anomaly Detection in Web Traffic Using a Stack of Classifier Ensemble[J].IEEE Access,2020,8:24120-24134.
[13] MOHAMMADI S,NAMADCHIAN A.Anomaly-based WebAttack Detection:The Application of Deep Neural Network Seq2Seq With Attention Mechanism[J].The ISC International Journal of Information Security,2020,12(1):44-54.
[14] DU M,LI F,ZHENG G,et al.DeepLog:Anomaly Detection and Diagnosis from System Logs through Deep Learning[C]// The 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS'17).2017:1285-1298.
[15] JIANG F,FU Y,GUPTAB B,et al.Deep Learning based Multi-channel intelligent attack detection for Data Security[J].IEEE Transactions on Sustainable Computing,2020,5(2):204-212.
[16] JIN X,CUI B,YANG J,et al.Payload-Based Web Attack Detection Using Deep Neural Network[C]//Advances on Broad-Band Wireless Computing,Communication and Applications(BWCCA 2017).Lecture Notes on Data Engineering and Communications Technologies,2018:482-488.
[17] SKARUZ J,SEREDYNSKI F.Recurrent neural networks towards detection of SQL attacks[C]//2007 IEEE International Parallel and Distributed Processing Symposium.Rome,2007:1-8.
[18] LIU H Y,LANG B,LIU M,et al.CNN and RNN based payload classification methods for attack detection[J].Knowledge-Based Systems,2019,163(1):332-341.
[19] LI Z,ZOU D,XU S,et al.VulDeePecker:A Deep Learning-Based System for Vulnerability Detection[C]// Network and Distributed System Security Symposium.2018:23158.
[20] HOCHREITER S,SCHMIDHUBER J.Long Short-Term Me-mory[J].Neural Computation,1997,9(8):1735-1780.
[21] YONG B,LIU X,YU Q,et al.Malicious Web traffic detection for Internet of Things environments[J].Computers & Electrical Engineering,2019,77:260-272.
[1] SUN Hui-ting, FAN Yan-fang, MA Meng-xiao, CHEN Ruo-yu, CAI Ying. Dynamic Pricing-based Vehicle Collaborative Computation Offloading Scheme in VEC [J]. Computer Science, 2022, 49(9): 242-248.
[2] YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253.
[3] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[4] LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279.
[5] YUAN Hao-nan, WANG Rui-jin, ZHENG Bo-wen, WU Bang-yan. Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric [J]. Computer Science, 2022, 49(6A): 490-495.
[6] FANG Tao, YANG Yang, CHEN Jia-xin. Optimization of Offloading Decisions in D2D-assisted MEC Networks [J]. Computer Science, 2022, 49(6A): 601-605.
[7] LIU Zhang-hui, ZHENG Hong-qiang, ZHANG Jian-shan, CHEN Zhe-yi. Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems [J]. Computer Science, 2022, 49(6A): 619-627.
[8] ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743.
[9] XIE Wan-cheng, LI Bin, DAI Yue-yue. PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing [J]. Computer Science, 2022, 49(6): 3-11.
[10] DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24.
[11] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[12] ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337.
[13] ZHANG Hai-bo, ZHANG Yi-feng, LIU Kai-jian. Task Offloading,Migration and Caching Strategy in Internet of Vehicles Based on NOMA-MEC [J]. Computer Science, 2022, 49(2): 304-311.
[14] LIN Chao-wei, LIN Bing, CHEN Xing. Study on Scientific Workflow Scheduling Based on Fuzzy Theory Under Edge Environment [J]. Computer Science, 2022, 49(2): 312-320.
[15] LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!