...
首页> 外文期刊>Applied Sciences >An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level
【24h】

An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level

机译:基于LSTM的深度学习方法,用于在数据包级别进行恶意流量

获取原文
   

获取外文期刊封面封底 >>

       

摘要

Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify malicious traffic. However, these state-of-the-art systems also face tremendous challenges to satisfy real-time analysis requirements due to the major delay of the flow-based data preprocessing, i.e., requiring time for accumulating the packets into particular flows and then extracting features. If detecting malicious traffic can be done at the packet level, detecting time will be significantly reduced, which makes the online real-time malicious traffic detection based on deep learning technologies become very promising. With the goal of accelerating the whole detection process by considering a packet level classification, which has not been studied in the literature, in this research, we propose a novel approach in building the malicious classification system with the primary support of word embedding and the LSTM model. Specifically, we propose a novel word embedding mechanism to extract packet semantic meanings and adopt LSTM to learn the temporal relation among fields in the packet header and for further classifying whether an incoming packet is normal or a part of malicious traffic. The evaluation results on ISCX2012, USTC-TFC2016, IoT dataset from Robert Gordon University and IoT dataset collected on our Mirai Botnet show that our approach is competitive to the prior literature which detects malicious traffic at the flow level. While the network traffic is booming year by year, our first attempt can inspire the research community to exploit the advantages of deep learning to build effective IDSs without suffering significant detection delay.
机译:最近,深入学习已经成功应用于网络安全评估和入侵检测系统(IDS),其中各种突破,例如使用卷积神经网络(CNN)和长短期内存(LSTM)来分类恶意流量。然而,这些最先进的系统也面临着满足基于流量的数据预处理的主要延迟的实时分析要求的巨大挑战,即要求将数据包累积为特定流程,然后提取特征。如果检测到恶意流量可以在数据包级别完成,则检测时间将被显着减少,这使得基于深度学习技术的在线实时恶意交通检测变得非常有前景。通过考虑在文献中尚未研究的数据包级别分类的目标,在本研究中,我们提出了一种新颖的方法,在建立恶意分类系统时,通过单词嵌入和LSTM的主要支持模型。具体而言,我们提出了一种新颖的嵌入机制来提取分组语义含义,采用LSTM来学习数据包报头中的字段之间的时间关系,并且为了进一步分类传入的数据包是否正常或恶意流量的一部分。来自Robert Gordon University的ISCX2012,USTC-TFC2016的评估结果来自罗伯特戈登大学的IOT DataSet,我们的Mirai Botnet收集的IoT DataSet表明我们的方法对检测流量水平的恶意流量的先前文献具有竞争力。虽然网络流量达到了一年,但我们的第一次尝试可以激发研究界,利用深度学习的优势,在不遭受显着的检测延迟的情况下建立有效的IDS。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号