A novel flow-vector generation approach for malicious traffic detection

被引:19
|
作者
Hou, Jian [1 ,2 ]
Liu, Fangai [1 ]
Lu, Hui [2 ]
Tan, Zhiyuan [3 ]
Zhuang, Xuqiang [1 ]
Tian, Zhihong [2 ]
机构
[1] Shandong Normal Univ, Informatizat Off, Jinan 250014, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510300, Peoples R China
[3] Edinburgh Napier Univ, Sch Comp, Merchiston Campus, Edinburgh EH10 5DT, Scotland
基金
中国国家自然科学基金;
关键词
Deep learning; Malicious traffic; Embedding; Attention mechanism; DEEP LEARNING APPROACH; NEURAL-NETWORKS; INTRUSION;
D O I
10.1016/j.jpdc.2022.06.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefiting from the development of deep learning techniques, raw traffic can be directly used as a feature to detect malicious traffic. Most existing work usually converts raw traffic into images or long sequences to express a flow and then uses deep learning technology to extract features and classify them, but the generated features contain much redundant or even useless information, especially for encrypted traffic. The packet header field contains most of the packet characteristics except the payload content, and it is also an important element of the flow. In this paper, we only use the fields of the packet header in the raw traffic to construct the characteristic representation of the traffic and propose a novel flow-vector generation approach for malicious traffic detection. The preprocessed header fields are embedded as field vectors, and then a two-layer attention network is used to progressively generate the packet vectors and the flow vector containing context information. The flow vector is regarded as the abstraction of the raw traffic and is used to classify. The experiment results illustrate that the accuracy rate can reach up to 99.48% in the binary classification task and the average of AUC-ROC can reach 0.9988 in the multi-classification task. (C) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:72 / 86
页数:15
相关论文
共 50 条
  • [21] A Taxonomy of Malicious Traffic for Intrusion Detection Systems
    Hindy, Hanan
    Hodo, Elike
    Bayne, Ethan
    Seeam, Amar
    Atkinson, Robert
    Bellekens, Xavier
    2018 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2018,
  • [22] Malicious Encryption Traffic Detection Based on NLP
    Yang, Hao
    He, Qin
    Liu, Zhenyan
    Zhang, Qian
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [23] Balancing the Detection of Malicious Traffic in SDN Context
    Machado, Bruno Salgado
    Silva, Joao Marco C.
    Lima, Solange Rito
    Carvalho, Paulo
    12TH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2021), 2021, : 106 - 111
  • [24] DNS Traffic Analysis for Malicious Domains Detection
    Ghafir, Ibrahim
    Prenosil, Vaclav
    2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) 2015, 2015, : 613 - 618
  • [25] Malicious Domain Detection Based on Traffic Similarity
    Hu, Jianping
    Wang, Yongyi
    Shi, Fan
    Xu, Chengxi
    2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY, CII 2017, 2017, : 416 - 421
  • [26] Detection and Countermeasure of Encrypted Malicious Traffic: A Survey
    Hou J.
    Lu H.
    Liu F.-A.
    Wang X.-W.
    Tian Z.-H.
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (01): : 333 - 355
  • [27] Malicious traffic detection for cloud-edge-end networks: A deep learning approach
    Liu, Hanbing
    Han, Fang
    Zhang, Yajuan
    COMPUTER COMMUNICATIONS, 2024, 215 : 150 - 156
  • [28] An Approach to Malicious Payload Detection
    Zhang, Z.
    George, R.
    Shujaee, K.
    2018 WORLD AUTOMATION CONGRESS (WAC), 2018, : 52 - 57
  • [29] Integrated Fuzzy Based Computational Mechanism for the Selection of Effective Malicious Traffic Detection Approach
    Almotiri, Sultan H.
    IEEE ACCESS, 2021, 9 : 10751 - 10764
  • [30] CoMDet: A Contrastive Multimodal Pre-Training Approach to Encrypted Malicious Traffic Detection
    Sun, Jiakun
    Zhang, Xiaotian
    Wang, Yabo
    Ji, Shuyuan
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 1118 - 1125