Malicious-Traffic Classification Using Deep Learning with Packet Bytes and Arrival Time.

作者: Ingyom Kim , Tai-Myoung Chung

DOI: 10.1007/978-3-030-63924-2_20

关键词: Computer technologyImage file formatsNetwork packetComputer sciencePayload (computing)Real-time computingIntrusion detection systemMalwareTraffic classificationDeep learningArtificial intelligence

摘要: Internet technology is rapidly developing through the development of computer technology. However, we haven been experiencing problems such as malware with these developments. Various methods detection have studied for years to respond malicious codes. There are three main ways classify traffic. They port-based, payload-based and a machine learning method. We attempt traffic using CNN which one deep algorithms. The features use packet’s size its arrival time. time information extracted then converted into an image file. used what type attack is. accuracy proposed technique was 95%, showed very high performance, proving that classification possible.

参考文章(22)
Hai Wang, Ni Gao, Quanli Gao, Ling Gao, An Intrusion Detection Model Based on Deep Belief Networks international conference on advanced cloud and big data. pp. 247- 252 ,(2014) , 10.1109/.40
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, M.A. Zissman, Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation darpa information survivability conference and exposition. ,vol. 2, pp. 12- 26 ,(2000) , 10.1109/DISCEX.2000.821506
Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, Ali A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection Computers & Security. ,vol. 31, pp. 357- 374 ,(2012) , 10.1016/J.COSE.2011.12.012
Tom Auld, Andrew W. Moore, Stephen F. Gull, Bayesian Neural Networks for Internet Traffic Classification IEEE Transactions on Neural Networks. ,vol. 18, pp. 223- 239 ,(2007) , 10.1109/TNN.2006.883010
Sharmila KishorWagh, Vinod K. Pachghare, Satish R. Kolhe, Survey on Intrusion Detection System using Machine Learning Techniques International Journal of Computer Applications. ,vol. 78, pp. 30- 37 ,(2013) , 10.5120/13608-1412
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, Luca Salgarelli, Traffic classification through simple statistical fingerprinting acm special interest group on data communication. ,vol. 37, pp. 5- 16 ,(2007) , 10.1145/1198255.1198257
H G Kayacik, A N Zincir Heywood, M I Heywood, SELECTING FEATURES FOR INTRUSION DETECTION: A FEATURE RELEVANCE ANALYSIS ON KDD 99 INTRUSION DETECTION DATASETS PROCEEDINGS OF THE ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST. pp. 0- 0 ,(2005)
Mohd Hasbullah Omar, Hatim Mohamad Tahir, Noor Izzah Yahya, Nur Farzana Kabir, Wail Hasan, Nur Haryani Zakaria, Osman Ghazali, Norliza Katuk, Abas Said, Hybrid machine learning technique for intrusion detection system ,(2015)
Nour Moustafa, Jill Slay, UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) military communications and information systems conference. pp. 1- 6 ,(2015) , 10.1109/MILCIS.2015.7348942