A novel flow-vector generation approach for malicious traffic detection

被引:19
|
作者
Hou, Jian [1 ,2 ]
Liu, Fangai [1 ]
Lu, Hui [2 ]
Tan, Zhiyuan [3 ]
Zhuang, Xuqiang [1 ]
Tian, Zhihong [2 ]
机构
[1] Shandong Normal Univ, Informatizat Off, Jinan 250014, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510300, Peoples R China
[3] Edinburgh Napier Univ, Sch Comp, Merchiston Campus, Edinburgh EH10 5DT, Scotland
基金
中国国家自然科学基金;
关键词
Deep learning; Malicious traffic; Embedding; Attention mechanism; DEEP LEARNING APPROACH; NEURAL-NETWORKS; INTRUSION;
D O I
10.1016/j.jpdc.2022.06.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefiting from the development of deep learning techniques, raw traffic can be directly used as a feature to detect malicious traffic. Most existing work usually converts raw traffic into images or long sequences to express a flow and then uses deep learning technology to extract features and classify them, but the generated features contain much redundant or even useless information, especially for encrypted traffic. The packet header field contains most of the packet characteristics except the payload content, and it is also an important element of the flow. In this paper, we only use the fields of the packet header in the raw traffic to construct the characteristic representation of the traffic and propose a novel flow-vector generation approach for malicious traffic detection. The preprocessed header fields are embedded as field vectors, and then a two-layer attention network is used to progressively generate the packet vectors and the flow vector containing context information. The flow vector is regarded as the abstraction of the raw traffic and is used to classify. The experiment results illustrate that the accuracy rate can reach up to 99.48% in the binary classification task and the average of AUC-ROC can reach 0.9988 in the multi-classification task. (C) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:72 / 86
页数:15
相关论文
共 50 条
  • [31] PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification
    Narang, Pratik
    Hota, Chittaranjan
    Venkatakrishnan, V. N.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2014, (01): : 1 - 12
  • [32] Deep Learning for Malicious Flow Detection
    Chen, Yun-Chun
    Li, Yu-Jhe
    Tseng, Aragorn
    Lin, Tsungnan
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [33] A Vision-Based Traffic Flow Detection Approach
    Yin, Hongpeng
    Zhang, Kun
    Chai, Yi
    PROCEEDINGS OF THE 2015 CHINESE INTELLIGENT SYSTEMS CONFERENCE, VOL 1, 2016, 359 : 143 - 152
  • [34] A Traffic Flow Approach to Early Detection of Gathering Events
    Zhou, Xun
    Khezerlou, Amin Vahedian
    Liu, Alex
    Shafiq, Zubair
    Zhang, Fan
    24TH ACM SIGSPATIAL INTERNATIONAL CONFERENCE ON ADVANCES IN GEOGRAPHIC INFORMATION SYSTEMS (ACM SIGSPATIAL GIS 2016), 2016,
  • [35] A Method of HTTP Malicious Traffic Detection on Mobile Networks
    Li, Jia
    Yun, Xiaochun
    Tian, Mao
    Xie, Jiang
    Li, Shuhao
    Zhang, Yongzheng
    Zhou, Yu
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [36] Blacklist-based Malicious IP Traffic Detection
    Ghafir, Ibrahim
    Prenosil, Vaclav
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 229 - 233
  • [37] A Framework for Malicious Traffic Detection in IoT Healthcare Environment
    Hussain, Faisal
    Abbas, Syed Ghazanfar
    Shah, Ghalib A.
    Pires, Ivan Miguel
    Fayyaz, Ubaid U.
    Shahzad, Farrukh
    Garcia, Nuno M.
    Zdravevski, Eftim
    SENSORS, 2021, 21 (09)
  • [38] Learning Invariant Representation for Malicious Network Traffic Detection
    Bartos, Karel
    Sofka, Michal
    Franc, Vojtech
    ECAI 2016: 22ND EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, 285 : 1132 - 1139
  • [39] Traffic-based Malicious Switch Detection in SDN
    Du, Xiaodong
    Wang, Ming-Zhong
    Zhang, Xiaoping
    Zhu, Liehuang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 119 - 130
  • [40] AGAE: Unsupervised Anomaly Detection for Encrypted Malicious Traffic
    Wang, Hao
    Wang, Ye
    Gu, Zhaoquan
    Jia, Yan
    WEB AND BIG DATA, APWEB-WAIM 2024, PT IV, 2024, 14964 : 448 - 464