Encrypted malicious traffic detection based on natural language processing and deep learning

被引:0
|
作者
Zang, Xiaodong [1 ,2 ,3 ]
Wang, Tongliang [1 ]
Zhang, Xinchang [2 ]
Gong, Jian [3 ]
Gao, Peng [1 ]
Zhang, Guowei [1 ]
机构
[1] School of Cyber Science and Engineering, Qufu Normal University, QuFu, China
[2] Qilu University of Technology (Shandong Academy of Sciences) Shandong Computer Science Center, Shandong Provincial Key Laboratory of Computer Networks, JiNan, China
[3] Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, NanJing, China
基金
中国国家自然科学基金;
关键词
Anomaly detection - Behavioral research - Cryptography - Deep learning - Learning algorithms - Natural language processing systems - Network security;
D O I
10.1016/j.comnet.2024.110598
中图分类号
学科分类号
摘要
The focus on privacy protection has brought much-encrypted network traffic. However, attackers always abuse traffic encryption to conceal malicious behaviors. Although researchers have proposed several enlightening detection methods, they must enhance the generalization ability or improve detection performance. Our inspiration is that the packet header fields, as do the underlying grammatical rules for constructing sentences, have a strict order. We consider the original packet as text and devise a robust approach with natural language processing and a deep learning model to improve the generalization ability and detection performance. We capture the critical keywords as characteristic representations of the traffic and design an adaptive domain generalization algorithm with a new loss function. It is robust against various datasets by generating more malicious samples to augment the minority of malicious samples. Simultaneously, we design an efficient feature selection algorithm, which obtains an optimal feature subset and reduces feature dimensions by 75.3%. To evaluate our work, we conducted extensive experiments with open-source datasets (CICIDS 2017, CICDDoS 2019, and USTC-TFC 2016), the synthetic dataset from IoT-23, and Internet backbone traffic (CERNET). Experimental results demonstrate that our proposal improves detection accuracy by up to 22.8% compared to others not using domain generalization algorithms and achieves an average detection latency of 0.67 s in the backbone. Besides, our work applies to the Industrial Internet of Things (IIoT) environment. It can be deployed at edge nodes to provide network security support for IIoT devices. © 2024
引用
收藏
相关论文
共 50 条
  • [1] Deep-Forest-Based Encrypted Malicious Traffic Detection
    Zhang, Xueqin
    Zhao, Min
    Wang, Jiyuan
    Li, Shuang
    Zhou, Yue
    Zhu, Shinan
    [J]. ELECTRONICS, 2022, 11 (07)
  • [2] A deep-learning- and reinforcement-learning-based system for encrypted network malicious traffic detection
    Yang, Jin
    Liang, Gang
    Li, Beibei
    Wen, Guozhu
    Gao, Tianyu
    [J]. ELECTRONICS LETTERS, 2021, 57 (09) : 363 - 365
  • [3] Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms
    Wang, Zihao
    Thing, Vrizlynn L. L.
    [J]. COMPUTERS & SECURITY, 2023, 128
  • [4] Detection of Encrypted Malicious Network Traffic using Machine Learning
    De Lucia, Michael J.
    Cotton, Chase
    [J]. MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [5] Multi-Granularity Representation Learning for Encrypted Malicious Traffic Detection
    Gu, Yong-Hao
    Xu, Hao
    Zhang, Xiao-Qing
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (09): : 1888 - 1899
  • [6] Encrypted Malicious Traffic Detection Based on Hidden Markov Model
    Zou, Fu-Tai
    Yu, Tang-Da
    Xu, Wen-Liang
    [J]. Ruan Jian Xue Bao/Journal of Software, 2022, 33 (07): : 2683 - 2698
  • [7] An Encrypted Malicious Traffic Detection System Based On Neural Network
    Yu, Tangda
    Zou, Futai
    Li, Linsen
    Yi, Ping
    [J]. 2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, : 62 - 70
  • [8] TOWARDS MALICIOUS ACTION DETECTION FOR NUCLEAR SERUCITY VIA INTEGRATED DEEP LEARNING BASED IMAGE RECOGNITION AND NATURAL LANGUAGE PROCESSING
    Demachi, Kazuyuki
    Sudo, Masaki
    Chen, Shi
    [J]. PROCEEDINGS OF 2021 28TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING (ICONE28), VOL 3, 2021,
  • [9] Detection and Countermeasure of Encrypted Malicious Traffic: A Survey
    Hou, Jian
    Lu, Hui
    Liu, Fang-Ai
    Wang, Xing-Wei
    Tian, Zhi-Hong
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (01): : 333 - 355
  • [10] Anomaly Detection of System Logs Based on Natural Language Processing and Deep Learning
    Wang, Mengying
    Xu, Lele
    Guo, Lili
    [J]. 2018 4TH INTERNATIONAL CONFERENCE ON FRONTIERS OF SIGNAL PROCESSING (ICFSP 2018), 2018, : 140 - 144