Learning Detector of Malicious Network Traffic from Weak Labels

被引:14
|
作者
Franc, Vojtech [1 ,2 ]
Sofka, Michal [1 ]
Bartos, Karel [1 ]
机构
[1] Cisco Syst, Prague, Czech Republic
[2] Czech Tech Univ, Dept Cybernet, Fac Elect Engn, CR-16635 Prague, Czech Republic
关键词
Computer security; Malware detection; Multiple-instance learning; Support vector machines;
D O I
10.1007/978-3-319-23461-8_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We address the problem of learning a detector of malicious behavior in network traffic. The malicious behavior is detected based on the analysis of network proxy logs that capture malware communication between client and server computers. The conceptual problem in using the standard supervised learning methods is the lack of sufficiently representative training set containing examples of malicious and legitimate communication. Annotation of individual proxy logs is an expensive process involving security experts and does not scale with constantly evolving malware. However, weak supervision can be achieved on the level of properly defined bags of proxy logs by leveraging internet domain black lists, security reports, and sandboxing analysis. We demonstrate that an accurate detector can be obtained from the collected security intelligence data by using a Multiple Instance Learning algorithm tailored to the Neyman-Pearson problem. We provide a thorough experimental evaluation on a large corpus of network communications collected from various company network environments.
引用
收藏
页码:85 / 99
页数:15
相关论文
共 50 条
  • [1] Deep Learning for Classifying Malicious Network Traffic
    Millar, K.
    Cheng, A.
    Chew, H. G.
    Lim, C-C
    [J]. TRENDS AND APPLICATIONS IN KNOWLEDGE DISCOVERY AND DATA MINING: PAKDD 2018 WORKSHOPS, 2018, 11154 : 156 - 161
  • [2] MMCo: using multimodal deep learning to detect malicious traffic with noisy labels
    Qingjun Yuan
    Gaopeng Gou
    Yuefei Zhu
    Yongjuan Wang
    [J]. Frontiers of Computer Science, 2024, 18
  • [3] MMCo: using multimodal deep learning to detect malicious traffic with noisy labels
    Yuan, Qingjun
    Gou, Gaopeng
    Zhu, Yuefei
    Wang, Yongjuan
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (01)
  • [4] Learning Invariant Representation for Malicious Network Traffic Detection
    Bartos, Karel
    Sofka, Michal
    Franc, Vojtech
    [J]. ECAI 2016: 22ND EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, 285 : 1132 - 1139
  • [5] Detection of Encrypted Malicious Network Traffic using Machine Learning
    De Lucia, Michael J.
    Cotton, Chase
    [J]. MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [6] Evaluation of Machine Learning Algorithms for Detection of Malicious Traffic in SCADA Network
    L. Rajesh
    Penke Satyanarayana
    [J]. Journal of Electrical Engineering & Technology, 2022, 17 : 913 - 928
  • [7] A NOVEL TRANSFER LEARNING BASED ON ALBERT FOR MALICIOUS NETWORK TRAFFIC CLASSIFICATION
    Han, Luchao
    Zeng, Xuewen
    Song, Lei
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2020, 16 (06): : 2103 - 2119
  • [8] Applying machine learning techniques for detection of malicious code in network traffic
    Elovici, Yuval
    Shabtai, Asaf
    Moskovitch, Robert
    Tahan, Gil
    Glezer, Chanan
    [J]. KI 2007: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2007, 4667 : 44 - +
  • [9] Evaluation of Machine Learning Algorithms for Detection of Malicious Traffic in SCADA Network
    Rajesh, L.
    Satyanarayana, Penke
    [J]. JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2022, 17 (02) : 913 - 928
  • [10] Learning from Weak and Noisy Labels for Semantic Segmentation
    Lu, Zhiwu
    Fu, Zhenyong
    Xiang, Tao
    Han, Peng
    Wang, Liwei
    Gao, Xin
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2017, 39 (03) : 486 - 500