Analyzing the Semantic Structure of Network Flow: A Threat Detection Method With Independent Generalization Capabilities

被引:0
|
作者
Luo, Yiqing [1 ]
He, Mingshu [2 ]
Wang, Xiaojuan [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2025年 / 12卷 / 01期
基金
中国国家自然科学基金;
关键词
Semantics; Feature extraction; Threat assessment; Data models; Correlation; Data structures; Representation learning; Libraries; Cyberspace; Analytical models; Threat detection; semantic association features; independent generalization ability; ENCRYPTED TRAFFIC CLASSIFICATION; INTRUSION DETECTION; DEEP; ATTACKS;
D O I
10.1109/TNSE.2024.3483216
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Network threat detection and identification remain fundamental tasks in cyberspace defence. Existing graph-based detection methods exhibit limited capabilities in transformability and independence, necessitating a redefinition of network behaviour to enhance their applicability in scenarios such as unknown threat discovery and low sample detection. In response to these challenges, we propose a fine-grained threat detection method based on flow semantic structure, with independent generalization capabilities, to refine the definition of flow and behaviour representation in data analysis. By constructing a semantic association topology map for each flow, the proposed method utilizes behavioural data structure information to extract semantic structure features independently. Subsequently, it aggregates updated graph node information into flow-level semantic embeddings, facilitating behaviour prediction. The final evaluation results show that this method outperforms existing state-of-the-art models, achieving detection accuracies of 97.86%, 95.76%, and 99.62% on three publicly datasets, respectively. In addition, the evaluation through simulating real threat detection environments at different concentrations shows that this method can still maintain a high detection rate with a small amount of data involved in training, and has certain generalization ability for new samples.
引用
收藏
页码:28 / 43
页数:16
相关论文
共 50 条
  • [1] Analyzing threat flow over network using ensemble-based dense network model
    U. Harita
    Moulana Mohammed
    Soft Computing, 2024, 28 : 4171 - 4184
  • [2] Analyzing threat flow over network using ensemble-based dense network model
    Harita, U.
    Mohammed, Moulana
    SOFT COMPUTING, 2024, 28 (05) : 4171 - 4184
  • [3] Method of analyzing the influence of network structure on information diffusion
    Nagata, Katsuya
    Shirayama, Susumu
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2012, 391 (14) : 3783 - 3791
  • [4] A Semantic Detection Method for Network Flows With Global and Generalized Nature
    Wang, Xiaojuan
    Luo, Yiqing
    He, Mingshu
    Wang, Xinlei
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (04): : 4713 - 4730
  • [5] A Graph Convolution Neural Network Based Method for Insider Threat Detection
    Fei, Kexiong
    Zhou, Jiang
    Su, Lin
    Wang, Weiping
    Chen, Yong
    Zhang, Fan
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 66 - 73
  • [6] A Method for Road Network Selection Considering the Traffic Flow Semantic Information
    Deng M.
    Chen X.
    Tang J.
    Liu H.
    He J.
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan University, 2020, 45 (09): : 1438 - 1447
  • [7] A Network Intrusion Detection Method using Independent Component Analysis
    Yang, Dayu
    Qi, Hairong
    19TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOLS 1-6, 2008, : 591 - 594
  • [8] Training with Noise Adversarial Network: A Generalization Method for Object Detection on Sonar Image
    Ma, Qixiang
    Jiang, Longyu
    Yu, Wenxue
    Jin, Rui
    Wu, Zhixiang
    Xu, Fangjin
    2020 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV), 2020, : 718 - 727
  • [9] Logic detection method in network culture communication based on semantic relevance
    Ding, Yu
    Yuan, Nianxing
    PERSONAL AND UBIQUITOUS COMPUTING, 2020, 24 (02) : 287 - 298
  • [10] Logic detection method in network culture communication based on semantic relevance
    Yu Ding
    Nianxing Yuan
    Personal and Ubiquitous Computing, 2020, 24 : 287 - 298