Skip to main content
Top

2020 | OriginalPaper | Chapter

Malicious-Traffic Classification Using Deep Learning with Packet Bytes and Arrival Time

Authors : Ingyom Kim, Tai-Myoung Chung

Published in: Future Data and Security Engineering

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet technology is rapidly developing through the development of computer technology. However, we haven been experiencing problems such as malware with these developments. Various methods of malware detection have been studied for years to respond to malicious codes. There are three main ways to classify traffic. They are port-based, payload-based and a machine learning method. We attempt to classify malicious traffic using CNN which is one of deep learning algorithms. The features we use for CNN are the packet’s size and its arrival time. The packet’s size and arrival time information are extracted and then converted into an image file. The converted image is then used for CNN to classify what type of attack the traffic is. The accuracy of the proposed technique was 95%, which showed very high performance, proving that classification was possible.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Tidjon, L.N., Frappier, M., Mammar, A.: Intrusion detection systems: a cross domain overview. IEEE Commun. Surv. Tutor. 21, 3639–3681 (2019)CrossRef Tidjon, L.N., Frappier, M., Mammar, A.: Intrusion detection systems: a cross domain overview. IEEE Commun. Surv. Tutor. 21, 3639–3681 (2019)CrossRef
2.
go back to reference Auld, T., Moore, A.W., Gull, S.F.: Bayesian neural networks for internet traffic classification. IEEE Trans. Neural Netw. 18(1), 223–239 (2007)CrossRef Auld, T., Moore, A.W., Gull, S.F.: Bayesian neural networks for internet traffic classification. IEEE Trans. Neural Netw. 18(1), 223–239 (2007)CrossRef
3.
go back to reference Crotti, M., et al.: Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Comput. Commun. Rev. 37(1), 5–16 (2007)CrossRef Crotti, M., et al.: Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Comput. Commun. Rev. 37(1), 5–16 (2007)CrossRef
4.
go back to reference Wagh, S.K., Pachghare, V.K., Kolhe, S.R.: Survey on intrusion detection system using machine learning techniques. Int. J. Comput. Appl. 78(16), 30–37 (2013) Wagh, S.K., Pachghare, V.K., Kolhe, S.R.: Survey on intrusion detection system using machine learning techniques. Int. J. Comput. Appl. 78(16), 30–37 (2013)
5.
go back to reference Alhakami, W., et al.: Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection. IEEE Access 7, 52181–52190 (2019)CrossRef Alhakami, W., et al.: Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection. IEEE Access 7, 52181–52190 (2019)CrossRef
6.
go back to reference Shin, D., Choi, K., Chune, S., Choi, H.: Malicious traffic detection using K-means. J. Korean Inst. Commun. Inf. Sci. 41(2), 277–284 (2016) Shin, D., Choi, K., Chune, S., Choi, H.: Malicious traffic detection using K-means. J. Korean Inst. Commun. Inf. Sci. 41(2), 277–284 (2016)
7.
go back to reference Tahir, M., et al.: Hybrid machine learning technique for intrusion detection system. In: 5th International Conference on Computing and Informatics (ICOCI) (2015) Tahir, M., et al.: Hybrid machine learning technique for intrusion detection system. In: 5th International Conference on Computing and Informatics (ICOCI) (2015)
8.
go back to reference Gao, N., Gao, L., Gao, Q., Wang, H.: An intrusion detection model based on deep belief networks. In: 2014 2nd International Conference on Advanced Cloud and Big Data (CBD), pp. 247–252 (2014) Gao, N., Gao, L., Gao, Q., Wang, H.: An intrusion detection model based on deep belief networks. In: 2014 2nd International Conference on Advanced Cloud and Big Data (CBD), pp. 247–252 (2014)
9.
go back to reference Jo, S., Sung, H., Ahn, B.: A comparative study on the performance of SVM and an artificial neural network in intrusion detection. J. Korea Acad. Ind. Coop. Soc. 17(2), 703–711 (2016) Jo, S., Sung, H., Ahn, B.: A comparative study on the performance of SVM and an artificial neural network in intrusion detection. J. Korea Acad. Ind. Coop. Soc. 17(2), 703–711 (2016)
11.
go back to reference Mathai, K.J.: Performance comparison of intrusion detection system between deep belief network (DBN) algorithm and state preserving extreme learning machine (SPELM) algorithm. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE (2019) Mathai, K.J.: Performance comparison of intrusion detection system between deep belief network (DBN) algorithm and state preserving extreme learning machine (SPELM) algorithm. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE (2019)
12.
go back to reference Aggarwal, P., Dahiya, D.: Contribution of four class labeled attributes of kdd dataset on detection and false alarm rate for intrusion detection system. Indian J. Sci. Technol. 9(5), 1–8 (2016)CrossRef Aggarwal, P., Dahiya, D.: Contribution of four class labeled attributes of kdd dataset on detection and false alarm rate for intrusion detection system. Indian J. Sci. Technol. 9(5), 1–8 (2016)CrossRef
13.
go back to reference Gurung, S., Ghose, M.K., Subedi, A.: Deep learning approach on network intrusion detection system using NSL-KDD dataset. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 11(3), 8–14 (2019) Gurung, S., Ghose, M.K., Subedi, A.: Deep learning approach on network intrusion detection system using NSL-KDD dataset. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 11(3), 8–14 (2019)
14.
go back to reference Lippmann, R.P., et al.: Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In: Proceedings DARPA Information Survivability Conference and Exposition, DISCEX 2000, vol. 2. IEEE (2000) Lippmann, R.P., et al.: Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In: Proceedings DARPA Information Survivability Conference and Exposition, DISCEX 2000, vol. 2. IEEE (2000)
15.
go back to reference Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. In: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust, vol. 94 (2005) Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. In: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust, vol. 94 (2005)
16.
go back to reference Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4(6), 446–452 (2015) Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4(6), 446–452 (2015)
17.
go back to reference Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE (2015) Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE (2015)
19.
go back to reference Velea, R., Apostol, I., Patriciu, V.: LightPcapNg: implementing a library for general-purpose tracing based on PcapNg. In: 2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY). IEEE (2016) Velea, R., Apostol, I., Patriciu, V.: LightPcapNg: implementing a library for general-purpose tracing based on PcapNg. In: 2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY). IEEE (2016)
20.
go back to reference LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436–444 (2015)CrossRef LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436–444 (2015)CrossRef
Metadata
Title
Malicious-Traffic Classification Using Deep Learning with Packet Bytes and Arrival Time
Authors
Ingyom Kim
Tai-Myoung Chung
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-63924-2_20

Premium Partner