Loading Now

Summary of Attack and Defense Of Deep Learning Models in the Field Of Web Attack Detection, by Lijia Shi et al.


Attack and Defense of Deep Learning Models in the Field of Web Attack Detection

by Lijia Shi, Shihao Dong

First submitted to arxiv on: 18 Jun 2024

Categories

  • Main: Machine Learning (cs.LG)
  • Secondary: Cryptography and Security (cs.CR)

     Abstract of paper      PDF of paper


GrooveSquid.com Paper Summaries

GrooveSquid.com’s goal is to make artificial intelligence research accessible by summarizing AI papers in simpler terms. Each summary below covers the same AI paper, written at different levels of difficulty. The medium difficulty and low difficulty versions are original summaries written by GrooveSquid.com, while the high difficulty version is the paper’s original abstract. Feel free to learn from the version that suits you best!

Summary difficulty Written by Summary
High Paper authors High Difficulty Summary
Read the original abstract here
Medium GrooveSquid.com (original content) Medium Difficulty Summary
The abstract discusses the growing challenge of web attack detection (WAD), where hackers continually develop new methods to evade traditional detection. Deep learning models are effective in handling complex unknown attacks due to their strong generalization and adaptability, but they are vulnerable to backdoor attacks that compromise model stability. The paper proposes five methods for backdoor attacks in WAD, including defenses against these attacks. Testing on textCNN, biLSTM, and tinybert models shows an attack success rate over 87%, reducible through fine-tuning.
Low GrooveSquid.com (original content) Low Difficulty Summary
Web attack detection is a growing challenge as hackers refine their methods to evade traditional detection. Deep learning models can handle complex unknown attacks well, but they are vulnerable to backdoor attacks that compromise model stability. The paper introduces backdoor attacks in WAD and proposes ways to defend against them. This makes it harder for attackers to succeed.

Keywords

» Artificial intelligence  » Deep learning  » Fine tuning  » Generalization