首页> 外文期刊>Quality Control, Transactions >An Unsupervised Deep Learning Model for Early Network Traffic Anomaly Detection
【24h】

An Unsupervised Deep Learning Model for Early Network Traffic Anomaly Detection

机译:未经监督的早期网络流量异常检测深度学习模型

获取原文
获取原文并翻译 | 示例
           

摘要

Various attacks have emerged as the major threats to the success of a connected world like the Internet of Things (IoT), in which billions of devices interact with each other to facilitate human life. By exploiting the vulnerabilities of cheap and insecure devices such as IP cameras, an attacker can create hundreds of thousands of zombie devices and then launch massive volume attacks to take down any target. For example, in 2016, a record large-scale DDoS attack launched by millions of Mirai-injected IP cameras and smart printers blocked the accessibility of several high-profile websites. To date, the state-of-the-art defense systems against such attacks rely mostly on pre-defined features extracted from the entire flows or signatures. The feature definitions are manual, and it would be too late to block a malicious flow after extracting the flow features. In this work, we present an effective anomaly traffic detection mechanism, namely D-PACK, which consists of a Convolutional Neural Network (CNN) and an unsupervised deep learning model (e.g., Autoencoder) for auto-profiling the traffic patterns and filtering abnormal traffic. Notably, D-PACK inspects only the first few bytes of the first few packets in each flow for early detection. Our experimental results show that, by examining just the first two packets in each flow, D-PACK still performs with nearly 100 & x0025; accuracy, while features an extremely low false-positive rate, e.g., 0.83 & x0025;. The design can inspire the emerging efforts towards online anomaly detection systems that feature reducing the volume of processed packets and blocking malicious flows in time.
机译:各种攻击被出现为与事物互联网(物联网)这样的关联世界取得成功的主要威胁,其中数十亿个设备互相互动以促进人类的生活。通过利用廉价和不安全设备等IP摄像机等脆弱性,攻击者可以创建数十万个僵尸设备,然后启动大量卷攻击以取下任何目标。例如,在2016年,由数百万Mirai注入的IP摄像机和智能打印机启动的历史大规模DDOS攻击阻止了几个高调网站的可访问性。迄今为止,对这种攻击的最先进的防御系统主要依赖于从整个流或签名中提取的预定义的功能。特征定义是手动,在提取流量功能后阻止恶意流程为时已晚。在这项工作中,我们提出了有效的异常交通检测机制,即D-Pack,它由卷积神经网络(CNN)和无监督的深度学习模型(例如,AutoEncoder)组成,用于自动分析流量模式和过滤异常流量。值得注意的是,D-Pack仅检查每个流程中的前几个数据包的前几个字节以进行早期检测。我们的实验结果表明,通过检查每个流程中的前两个数据包,D-Pack仍然具有近100&x0025;准确性,而具有极低的假阳性率,例如,0.83&x0025;该设计可以激发新兴的努力,它对在线异常检测系统,其特征在于减少处理的数据包的体积并及时阻止恶意流动。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号