首页 | 本学科首页   官方微博 | 高级检索  
     

面向电力信息系统日志数据的注入攻击特征提取方法
引用本文:殷博,朱静雯,刘磊,许静. 面向电力信息系统日志数据的注入攻击特征提取方法[J]. 计算机应用与软件, 2021, 38(3): 319-326. DOI: 10.3969/j.issn.1000-386x.2021.03.049
作者姓名:殷博  朱静雯  刘磊  许静
作者单位:国网天津市电力公司 天津 300010;南开大学软件学院 天津 300350;南开大学人工智能学院 天津 300350;南开大学人工智能学院 天津 300350
基金项目:国家电网公司总部科技项目
摘    要:电力数据安全随着电力信息网与互联网的接入变得尤为严峻,其数据与规模愈加庞大复杂.为了对其进行有效的安全分析及特征提取,提出一种基于特征提取的SQL注入攻击检测模型.从Web访问日志中提取SQL注入语法特征和行为特征,得到语法特征矩阵和行为特征矩阵数据集.以漏报率和误报率为评价指标,选取K-means、Naive Bay...

关 键 词:Web访问日志  SQL  注入  语法特征  行为特征  电力系统

INJECTION ATTACK FEATURE EXTRACTION METHOD FOR LOG DATA OF POWER INFORMATION SYSTEM
Yin Bo,Zhu Jingwen,Liu Lei,Xu Jing. INJECTION ATTACK FEATURE EXTRACTION METHOD FOR LOG DATA OF POWER INFORMATION SYSTEM[J]. Computer Applications and Software, 2021, 38(3): 319-326. DOI: 10.3969/j.issn.1000-386x.2021.03.049
Authors:Yin Bo  Zhu Jingwen  Liu Lei  Xu Jing
Affiliation:(State Grid Tianjin Electric Power Company,Tianjin 300010,China;College of Software,Nankai University,Tianjin 300350,China;College of Artificial Intelligence,Nankai University,Tianjin 300350,China)
Abstract:Power data security becomes especially important with the access of power information network and Internet.Its data and scale become more and more huge and complex.To effectively perform security analysis and feature extraction,a SQL injection attack detection model based on feature extraction is proposed.SQL injection syntactic feature and behavioral feature were extracted from the Web access logs,and two types of data sets were obtained for syntactic feature matrix and behavioral feature matrix.Based on the evaluation index of false positive rate and false negative rate,K-means,Naive Bayes,SVM and RF algorithms were selected to experiment on two types of data sets.The results show that the behavioral feature matrix has a better effect in SQL injection attack detection than using the syntactic feature matrix as the data set.In addition,the detection effect of SVM and RF is better,with lower false negative rate and false positive rate.The method proposed in this paper can effectively detect SQL injection attacks.
Keywords:Web access logs  SQL injection  Syntactic feature  Behavioral feature  Power systems
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号