Action Identification Without Bounds on Applications Based on Self-Attention Mechanism

被引:0
|
作者
Wang C. [1 ]
Wei Z. [1 ]
Chen S. [1 ]
机构
[1] School of Computer, National University of Defense Technology, Changsha
基金
中国国家自然科学基金;
关键词
Action identification; Deep learning; Industrial Internet; Self-attention; Traffic classification;
D O I
10.7544/issn1000-1239.20211158
中图分类号
学科分类号
摘要
In recent years, the industrial Internet has experienced a rapid development. However, like the traditional Internet, the industrial Internet also faces a large number of threats from cyber-attacks and sensitive information leakage risks. Traffic classification technology, especially fine-grained application action identification, can assist network managers in detecting abnormal behaviors and discovering privacy leakage risks. It provides the security of the industrial Internet. Whereas, the existing action identification technology relies on the pre-segmentation of the action bounds in the traffic. In this case, existing methods cannot identify actions without bounds, which are difficult to be used in real scenes. Therefore, an action identification algorithm without bounds is proposed. Firstly, we build a packet-level identification model based on self-attention mechanism to classify packets. Then we propose an action aggregation algorithm to acquire action sequence from the classification results of packets. Finally, we establish two new indicators to measure the quality of the identification result. To verify the feasibility of our algorithm, we take WeChat as an example to conduct experiments. The results show that the model can achieve a sequential precision of up to 90%. This research is expected to greatly promote the practical application of action identification technology. © 2022, Science Press. All right reserved.
引用
收藏
页码:1092 / 1104
页数:12
相关论文
共 25 条
  • [1] Zhou Ji, Intelligent Manufacturing-the major direction of "Made in China 2025, Chinese Journal of Mechanical Engineering, 26, 17, pp. 2273-2284, (2015)
  • [2] The white paper of industrial Internet platform security (2020)
  • [3] Roughan M., Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification, Proc of the 4th ACM SIGCOMM Conf on Internet Measurement(IMC'04), pp. 135-148, (2004)
  • [4] Wang Wei, Zhu Ming, Zeng Xuewen, Et al., Malware traffic classification using convolutional neural network for representation learning, Proc of 2017 Int Conf on Information Networking (ICOIN), pp. 712-717, (2017)
  • [5] Pan Yuting, Lin Li, A trust-based DDoS discovery approach for encrypted traffic in cloud environment, Journal of Computer Research and Development, 58, 4, pp. 822-833, (2021)
  • [6] Conti M, Mancini L, Spolaor R, Et al., Analyzing Android encrypted network traffic to identify user actions, IEEE Transactions on Information Forensics and Security, 11, 1, pp. 114-125, (2016)
  • [7] Madhukar A, Williamson C., A longitudinal study of P2P traffic classification, Proc of the 14th IEEE Int Symp on Modeling, Analysis and Simulation, pp. 179-188, (2006)
  • [8] Moore A W, Papagiannaki K., Toward the accurate identification of network applications, Proc of Int Workshop on Passive and Active Network Measurement, pp. 41-54, (2005)
  • [9] Dewes C, Wichmann A, Feldmann A., An analysis of Internet chat systems, Proc of the 2003 SIGCOMM Conf on Internet Measurement, pp. 51-64, (2003)
  • [10] Sen S, Spatscheck O, Wang D., Accurate, scalable in-network identification of P2P traffic using application signatures, Proc of the 2004 Int Conf on World Wide Web, pp. 512-521, (2004)