Encrypted Malicious Traffic Detection Based on Word2Vec

被引:10
|
作者
Ferriyan, Andrey [1 ]
Thamrin, Achmad Husni [1 ]
Takeda, Keiji [2 ]
Murai, Jun [3 ]
机构
[1] Keio Univ, Grad Sch Media & Governance, Yokohama, Kanagawa 2520882, Japan
[2] Keio Univ, Fac Environm & Informat Studies, Yokohama, Kanagawa 2520882, Japan
[3] Keio Univ, Tokyo 1088345, Japan
关键词
privacy preserving IDS; TLS; Network Intrusion Detection System; encrypted malicious traffic;
D O I
10.3390/electronics11050679
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network-based intrusion detections become more difficult as Internet traffic is mostly encrypted. This paper introduces a method to detect encrypted malicious traffic based on the Transport Layer Security handshake and payload features without waiting for the traffic session to finish while preserving privacy. Our method, called TLS2Vec, creates words from the extracted features and uses Long Short-Term Memory (LSTM) for inference. We evaluated our method using traffic from three malicious applications and a benign application that we obtained from two publicly available datasets. Our results showed that TLS2Vec is promising as a tool to detect such malicious traffic.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Duplicate Short Text Detection Based on Word2vec
    Gao, Jin
    He, Yahao
    Zhang, Xiaoyan
    Xia, Yamei
    [J]. PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 33 - 37
  • [2] The Weighted Word2vec Paragraph Vectors for Anomaly Detection Over HTTP Traffic
    Li, Jieling
    Zhang, Hao
    Wei, Zhiqiang
    [J]. IEEE ACCESS, 2020, 8 : 141787 - 141798
  • [3] LogUAD: Log Unsupervised Anomaly Detection Based on Word2Vec
    Wang, Jin
    Zhao, Changqing
    He, Shiming
    Gu, Yu
    Alfarraj, Osama
    Abugabah, Ahed
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (03): : 1207 - 1222
  • [4] Word Semantic Similarity Calculation Based on Word2vec
    Jin, Xiaolin
    Zhang, Shuwu
    Liu, Jie
    [J]. 2018 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND INFORMATION SCIENCES (ICCAIS), 2018, : 12 - 16
  • [5] Word Clustering based on Word2vec and Semantic Similarity
    Luo Jie
    Wang Qinglin
    Li Yuan
    [J]. 2014 33RD CHINESE CONTROL CONFERENCE (CCC), 2014, : 517 - 521
  • [6] Study on Tibetan Word Vector based on Word2vec
    Yang, Ning
    Li, Guanyu
    Ding, Hailan
    Gong, Chunwei
    [J]. 2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [7] An Word2vec based on Chinese Medical Knowledge
    Zhu, Jiayi
    Ni, Pin
    Li, Yuming
    Peng, Junkun
    Dai, Zhenjin
    Le, Gangmin
    Bai, Xuming
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 6263 - 6265
  • [8] ECG analysis based on Word2Vec model
    Oliinyk, Yurii
    Tereschenko, Andrii
    Baklan, Igor
    Beraudo, Elisa
    [J]. IDDM 2021: INFORMATICS & DATA-DRIVEN MEDICINE: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATICS & DATA-DRIVEN MEDICINE (IDDM 2021), 2021, 3038 : 213 - 222
  • [9] WEIGHTED WORD2VEC BASED ON THE DISTANCE OF WORDS
    Chang, Chia-Yang
    Lee, Shie-Jue
    Lai, Chih-Chin
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 2, 2017, : 563 - 568
  • [10] Keywords Extraction Based on Word2Vec and TextRank
    Zhang, Yong
    Chen, Fen
    Zhang, Wufeng
    Zuo, Haoyang
    Yu, Fangyuan
    [J]. 2020 3RD INTERNATIONAL CONFERENCE ON BIG DATA AND EDUCATION (ICBDE 2020), 2020, : 37 - 42