A novel flow-vector generation approach for malicious traffic detection

被引:19
|
作者
Hou, Jian [1 ,2 ]
Liu, Fangai [1 ]
Lu, Hui [2 ]
Tan, Zhiyuan [3 ]
Zhuang, Xuqiang [1 ]
Tian, Zhihong [2 ]
机构
[1] Shandong Normal Univ, Informatizat Off, Jinan 250014, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510300, Peoples R China
[3] Edinburgh Napier Univ, Sch Comp, Merchiston Campus, Edinburgh EH10 5DT, Scotland
基金
中国国家自然科学基金;
关键词
Deep learning; Malicious traffic; Embedding; Attention mechanism; DEEP LEARNING APPROACH; NEURAL-NETWORKS; INTRUSION;
D O I
10.1016/j.jpdc.2022.06.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefiting from the development of deep learning techniques, raw traffic can be directly used as a feature to detect malicious traffic. Most existing work usually converts raw traffic into images or long sequences to express a flow and then uses deep learning technology to extract features and classify them, but the generated features contain much redundant or even useless information, especially for encrypted traffic. The packet header field contains most of the packet characteristics except the payload content, and it is also an important element of the flow. In this paper, we only use the fields of the packet header in the raw traffic to construct the characteristic representation of the traffic and propose a novel flow-vector generation approach for malicious traffic detection. The preprocessed header fields are embedded as field vectors, and then a two-layer attention network is used to progressively generate the packet vectors and the flow vector containing context information. The flow vector is regarded as the abstraction of the raw traffic and is used to classify. The experiment results illustrate that the accuracy rate can reach up to 99.48% in the binary classification task and the average of AUC-ROC can reach 0.9988 in the multi-classification task. (C) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:72 / 86
页数:15
相关论文
共 50 条
  • [41] An Adaptive Malicious Domain Detection Mechanism with DNS Traffic
    ShuoXu
    Li, ShuQin
    Meng, Kun
    Wu, LiJun
    Ding, Meng
    PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 86 - 91
  • [42] Analysis and Detection of Malicious Data Exfiltration in Web Traffic
    Al-Bataineh, Areej
    White, Gregory
    PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 26 - 31
  • [43] IoT Malicious Traffic Detection Based on Federated Learning
    Shen, Yi
    Zhang, Yuhan
    Li, Yuwei
    Ding, Wanmeng
    Hu, Miao
    Li, Yang
    Huang, Cheng
    Wang, Jie
    DIGITAL FORENSICS AND CYBER CRIME, PT 1, ICDF2C 2023, 2024, 570 : 249 - 263
  • [44] Input and Output Matter: Malicious Traffic Detection With Explainability
    Lin, Wanshuang
    Xia, Chunhe
    Wang, Tianbo
    Zhao, Yuan
    Xi, Liang
    Zhang, Song
    IEEE NETWORK, 2025, 39 (02): : 259 - 267
  • [45] Research on malicious traffic detection based on image recognition
    Li, Wei
    Chen, Yuliang
    Zhao, Lixin
    Luo, Yazhou
    Liu, Xin
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2023, 16 (02) : 134 - 142
  • [46] Malicious Web traffic detection for Internet of Things environments
    Yong, Binbin
    Liu, Xin
    Yu, Qingchen
    Huang, Liang
    Zhou, Qingguo
    COMPUTERS & ELECTRICAL ENGINEERING, 2019, 77 : 260 - 272
  • [47] CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic
    Zhang, Runzi
    Tong, Mingkai
    Chen, Lei
    Xue, Jianxin
    Liu, Wenmao
    Xie, Feng
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 736 - 743
  • [48] The HoneyTank: A scalable approach to collect malicious internet traffic
    Vanderavero, Nicolas
    Brouckaert, Xavier
    Bonaventure, Olivier
    Le Charlier, Baudouin
    International Journal of Critical Infrastructures, 2008, 4 (1-2) : 185 - 205
  • [49] A Machine Learning Approach to Malicious Java']JavaScript Detection using Fixed Length Vector Representation
    Ndichu, Samuel
    Ozawa, Seiichi
    Misu, Takeshi
    Okada, Kouichirou
    2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2018,
  • [50] A novel traffic accident detection method with comprehensive traffic flow features extraction
    Zhu, Liping
    Wang, Bingyao
    Yan, Yihan
    Guo, Shuang
    Tian, Gangyi
    SIGNAL IMAGE AND VIDEO PROCESSING, 2023, 17 (02) : 305 - 313