A novel flow-vector generation approach for malicious traffic detection

被引:19
|
作者
Hou, Jian [1 ,2 ]
Liu, Fangai [1 ]
Lu, Hui [2 ]
Tan, Zhiyuan [3 ]
Zhuang, Xuqiang [1 ]
Tian, Zhihong [2 ]
机构
[1] Shandong Normal Univ, Informatizat Off, Jinan 250014, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510300, Peoples R China
[3] Edinburgh Napier Univ, Sch Comp, Merchiston Campus, Edinburgh EH10 5DT, Scotland
基金
中国国家自然科学基金;
关键词
Deep learning; Malicious traffic; Embedding; Attention mechanism; DEEP LEARNING APPROACH; NEURAL-NETWORKS; INTRUSION;
D O I
10.1016/j.jpdc.2022.06.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefiting from the development of deep learning techniques, raw traffic can be directly used as a feature to detect malicious traffic. Most existing work usually converts raw traffic into images or long sequences to express a flow and then uses deep learning technology to extract features and classify them, but the generated features contain much redundant or even useless information, especially for encrypted traffic. The packet header field contains most of the packet characteristics except the payload content, and it is also an important element of the flow. In this paper, we only use the fields of the packet header in the raw traffic to construct the characteristic representation of the traffic and propose a novel flow-vector generation approach for malicious traffic detection. The preprocessed header fields are embedded as field vectors, and then a two-layer attention network is used to progressively generate the packet vectors and the flow vector containing context information. The flow vector is regarded as the abstraction of the raw traffic and is used to classify. The experiment results illustrate that the accuracy rate can reach up to 99.48% in the binary classification task and the average of AUC-ROC can reach 0.9988 in the multi-classification task. (C) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:72 / 86
页数:15
相关论文
共 50 条
  • [1] QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
    Zequn NIU
    Jingfeng XUE
    Yong WANG
    Tianwei LEI
    Weijie HAN
    Xianwei GAO
    Chinese Journal of Electronics, 2024, 33 (03) : 645 - 656
  • [2] QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
    Niu, Zequn
    Xue, Jingfeng
    Wang, Yong
    Lei, Tianwei
    Han, Weijie
    Gao, Xianwei
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (03) : 645 - 656
  • [3] Detection of Malicious Network Traffic Attacks Using Support Vector Machine
    Dwivedi, Devanshi
    Bhushan, Aditya
    Singh, Ashutosh Kumar
    Snehlata
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT II, 2024, 2091 : 54 - 68
  • [4] Flow based Sequential Grouping System for Malicious Traffic Detection
    Park, Jee-Tae
    Baek, Ui-Jun
    Lee, Min-Seong
    Goo, Young-Hoon
    Lee, Sung-Ho
    Kim, Myung-Sup
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (10): : 3771 - 3792
  • [5] TCN enhanced novel malicious traffic detection for IoT devices
    Liu Xin
    Liu Ziang
    Zhang Yingli
    Zhang Wenqiang
    Lv Dong
    Zhou Qingguo
    CONNECTION SCIENCE, 2022, 34 (01) : 1322 - 1341
  • [6] Android Malicious Application Detection Using Permission Vector and Network Traffic Analysis
    Kandukuru, Satish
    Sharma, R. M.
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 1126 - 1132
  • [7] Distributed Malicious Traffic Detection
    Liu, Ying
    Wang, Zhiqiang
    Pang, Shufang
    Ju, Lei
    ELECTRONICS, 2024, 13 (23):
  • [8] Analyzing the influence of the sampling rate in the detection of malicious traffic on flow data
    Campazas-Vega, Adrian
    Crespo-Martinez, Ignacio Samuel
    Guerrero-Higueras, Angel Manuel
    alvarez-Aparicio, Claudia
    Matellan, Vicente
    Fernandez-Llamas, Camino
    COMPUTER NETWORKS, 2023, 235
  • [9] Malicious attack detection based on traffic-flow information fusion
    Chen, Ye
    Lai, Yingxu
    Zhang, Zhaoyi
    Li, Hanmei
    Wang, Yuhang
    2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2022,
  • [10] Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection
    Fu, Chuanpu
    Li, Qi
    Xu, Ke
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (04) : 2972 - 2987