Encrypted malicious traffic detection based on natural language processing and deep learning

被引:0
|
作者
Zang, Xiaodong [1 ,2 ,3 ]
Wang, Tongliang [1 ]
Zhang, Xinchang [2 ]
Gong, Jian [3 ]
Gao, Peng [1 ]
Zhang, Guowei [1 ]
机构
[1] School of Cyber Science and Engineering, Qufu Normal University, QuFu, China
[2] Qilu University of Technology (Shandong Academy of Sciences) Shandong Computer Science Center, Shandong Provincial Key Laboratory of Computer Networks, JiNan, China
[3] Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, NanJing, China
基金
中国国家自然科学基金;
关键词
Anomaly detection - Behavioral research - Cryptography - Deep learning - Learning algorithms - Natural language processing systems - Network security;
D O I
10.1016/j.comnet.2024.110598
中图分类号
学科分类号
摘要
The focus on privacy protection has brought much-encrypted network traffic. However, attackers always abuse traffic encryption to conceal malicious behaviors. Although researchers have proposed several enlightening detection methods, they must enhance the generalization ability or improve detection performance. Our inspiration is that the packet header fields, as do the underlying grammatical rules for constructing sentences, have a strict order. We consider the original packet as text and devise a robust approach with natural language processing and a deep learning model to improve the generalization ability and detection performance. We capture the critical keywords as characteristic representations of the traffic and design an adaptive domain generalization algorithm with a new loss function. It is robust against various datasets by generating more malicious samples to augment the minority of malicious samples. Simultaneously, we design an efficient feature selection algorithm, which obtains an optimal feature subset and reduces feature dimensions by 75.3%. To evaluate our work, we conducted extensive experiments with open-source datasets (CICIDS 2017, CICDDoS 2019, and USTC-TFC 2016), the synthetic dataset from IoT-23, and Internet backbone traffic (CERNET). Experimental results demonstrate that our proposal improves detection accuracy by up to 22.8% compared to others not using domain generalization algorithms and achieves an average detection latency of 0.67 s in the backbone. Besides, our work applies to the Industrial Internet of Things (IIoT) environment. It can be deployed at edge nodes to provide network security support for IIoT devices. © 2024
引用
收藏
相关论文
共 50 条
  • [11] Research on Encrypted Malicious 5G Access Network Traffic Identification Based on Deep Learning
    Gao, Zongning
    Zhang, Shunliang
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2023, 2023, 14299 : 496 - 512
  • [12] Research on Encrypted Malicious 5G Access Network Traffic Identification Based on Deep Learning
    Gao, Zongning
    Zhang, Shunliang
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2023, 14299 LNCS : 496 - 512
  • [13] Encrypted Malicious Traffic Detection Based on Word2Vec
    Ferriyan, Andrey
    Thamrin, Achmad Husni
    Takeda, Keiji
    Murai, Jun
    [J]. ELECTRONICS, 2022, 11 (05)
  • [14] Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study
    Wang, Zihao
    Fok, Kar Wai
    Thing, Vrizlynn L. L.
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [15] Adversarial Malicious Encrypted Traffic Detection Based on Refined Session Analysis
    Li, Minghui
    Wu, Zhendong
    Chen, Keming
    Wang, Wenhai
    [J]. SYMMETRY-BASEL, 2022, 14 (11):
  • [16] Malicious Code Detection based on Image Processing Using Deep Learning
    Kumar, Rajesh
    Zhang Xiaosong
    Khan, Riaz Ullah
    Ahad, Ijaz
    Kumar, Jay
    [J]. PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE (ICCAI 2018), 2018, : 81 - 85
  • [17] AGAE: Unsupervised Anomaly Detection for Encrypted Malicious Traffic
    Wang, Hao
    Wang, Ye
    Gu, Zhaoquan
    Jia, Yan
    [J]. WEB AND BIG DATA, APWEB-WAIM 2024, PT IV, 2024, 14964 : 448 - 464
  • [18] Deep Learning in Natural Language Processing
    Feng, Haoda
    Shi, Feng
    [J]. NATURAL LANGUAGE ENGINEERING, 2021, 27 (03) : 373 - 375
  • [19] Deep learning of the natural language processing
    Allauzen, Alexandre
    Schuetze, Hinrich
    [J]. TRAITEMENT AUTOMATIQUE DES LANGUES, 2018, 59 (02): : 7 - 14
  • [20] Deep Learning for Encrypted Traffic Classification and Unknown Data Detection
    Pathmaperuma, Madushi H.
    Rahulamathavan, Yogachandran
    Dogan, Safak
    Kondoz, Ahmet M.
    [J]. SENSORS, 2022, 22 (19)