首页> 外文会议>Global Congress on Manufacturing and Management >DPI DFI: a Malicious Behavior Detection Method Combining Deep Packet Inspection and Deep Flow Inspection
【24h】

DPI DFI: a Malicious Behavior Detection Method Combining Deep Packet Inspection and Deep Flow Inspection

机译:DPI&DFI:深度包检测和深流量检查结合的恶意行为检测方法

获取原文

摘要

A malicious behavior detection approach which combines both the DPI (Deep Packet Inspection) and DFI (Deep Flow Inspection) is proposed, namely DPI & DFI. For the DPI & DFI method an outlier data mining method is employed. The fine-grained DPI is suitable for plaintext traffic, while DFI is a complementary for encrypted or emerging traffic. The collaborative detection approach includes three phases: DPI detection, DFI detection & comparison, and feedback. In present work, the C4.5 data-mining decision tree is adopted as classifier. The KDD Cup'99 benchmark is used and representative attack categories such as Probing, DOS, R2L (Remote to User) and U2R (User to Root) are evaluated. In-depth analysis demonstrates that the U2R and R2L attack categories lead to lower detection rate, and in particular the attack types contribute most are put forward. In future work, some other types of classifiers suitable to R2L and U2R attack categories should be investigated.
机译:提出了一种恶意行为检测方法,即结合DPI​​(深包检测)和DFI(深流量检查),即DPI和DFI。对于DPI和DFI方法,采用异常数据挖掘方法。细粒度DPI适用于明文流量,而DFI是加密或新兴流量的互补性。协作检测方法包括三个阶段:DPI检测,DFI检测和比较和反馈。在目前的工作中,C4.5数据挖掘决策树被用作分类器。使用KDD CUP'99基准测试,并评估代表性攻击类别,如探测,DOS,R2L(远程到用户)和U2R(用户到root)。深入分析表明,U2R和R2L攻击类别导致较低的检测率,特别是攻击类型最大贡献。在未来的工作中,应研究适合R2L和U2R攻击类别的其他一些类型的分类器。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号