A Deep Learning-Based Approach for Mimicking Network Topologies: The Neris Botnet as a Case of Study

被引:0
|
作者
Alvarez-Terribas, Francisco [1 ]
Magan-Carrion, Roberto [1 ]
Macia-Fernandez, Gabriel [1 ]
Mora Garcia, Antonio M. [2 ]
机构
[1] Univ Granada, Dept Signal Theory Commun & Telemat, Network Engn & Secur Grp, Granada, Spain
[2] Univ Granada Spain, Free Software Optimisat Search & Machine Learning, Dept Signal Theory Commun & Telemat, Granada, Spain
关键词
D O I
10.1007/978-3-031-18409-3_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The number of connected devices to Internet is growing every year, making almost everything in touch. However, this scenario increase the probability of systems and communications of suffering security attacks since the attack surface increases proportionally. To counteract against security attacks and threats Network Intrusion Detection Systems (NIDSs) are one of the most used security defenses nowadays. They rely on the use of predefined dataset's for their training and evaluation. However, datasets inner characteristics directly affect the robustness, reliability and performance of NIDSs. In this work, we propose the use of a Variational Autoencoder (VAE) to accurately generate network topologies. For that, we consider the IP addresses as a categorical information to generate them. Previous works avoid to use IPs to generate synthetic network samples thus losing relevant contextual information for NIDSs. Results show the feasibility of the proposed system to mimic the Neris Botnet behavior and characterizing its node roles.
引用
收藏
页码:192 / 201
页数:10
相关论文
共 50 条
  • [1] An interactive deep learning-based approach reveals mitochondrial cristae topologies
    Suga, Shogo
    Nakamura, Koki
    Nakanishi, Yu
    Humbel, Bruno M.
    Kawai, Hiroki
    Hirabayashi, Yusuke
    PLOS BIOLOGY, 2023, 21 (08)
  • [2] An efficient reinforcement learning-based Botnet detection approach
    Alauthman, Mohammad
    Aslam, Nauman
    Al-kasassbeh, Mouhammd
    Khan, Suleman
    Al-Qerem, Ahmad
    Choo, Kim-Kwang Raymond
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 150 (150)
  • [3] Deep learning-based classification model for botnet attack detection
    Abdulghani Ali Ahmed
    Waheb A. Jabbar
    Ali Safaa Sadiq
    Hiran Patel
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 3457 - 3466
  • [4] Deep learning-based classification model for botnet attack detection
    Ahmed, Abdulghani Ali
    Jabbar, Waheb A.
    Sadiq, Ali Safaa
    Patel, Hiran
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 13 (7) : 3457 - 3466
  • [5] Deep Learning-Based Community Detection Approach on Bitcoin Network
    Essaid, Meryam
    Ju, Hongteak
    SYSTEMS, 2022, 10 (06):
  • [6] Botnet detection based on network flow summary and deep learning
    Pektas, Abdurrahman
    Acarman, Tankut
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2018, 28 (06)
  • [7] Ontology population with deep learning-based NLP: a case study on the Biomolecular Network Ontology
    Ayadi, Ali
    Samet, Ahmed
    de Beuvron, Francois de Bertrand
    Zanni-Merk, Cecilia
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019), 2019, 159 : 572 - 581
  • [8] A novel Machine Learning-based approach for the detection of SSH botnet infection
    Martinez Garre, Jose Tomas
    Gil Perez, Manuel
    Ruiz-Martinez, Antonio
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 : 387 - 396
  • [9] A deep learning-based approach for predicting oil production: A case study in the United States
    Du, Jian
    Zheng, Jianqin
    Liang, Yongtu
    Ma, Yunlu
    Wang, Bohong
    Liao, Qi
    Xu, Ning
    Ali, Arshid Mahmood
    Rashid, Muhammad Imtiaz
    Shahzad, Khurram
    ENERGY, 2024, 288
  • [10] ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal Approach
    Giagkos, Dimitrios
    Kompougias, Orestis
    Litke, Antonis
    Papadakis, Nikolaos
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 409 - 425