Skip to main content

2019 | OriginalPaper | Buchkapitel

Using Convolutional Neural Networks for Classifying Malicious Network Traffic

verfasst von : Kyle Millar, Adriel Cheng, Hong Gunn Chew, Cheng-Chew Lim

Erschienen in: Deep Learning Applications for Cyber Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As the reliance on the Internet and its constituent applications increase, so too does the value in exploiting these networking systems. Methods to detect and mitigate these threats can no longer rely on singular facets of information, they must be able to adapt to new threats by learning from a diverse range of information. For its ability to learn complex inferences from large data sources, deep learning has become one of the most publicised techniques of machine learning in recent years. This chapter aims to investigate a deep learning technique typically used for image classification, the convolutional neural network (CNN), and how its methodology can be adapted to detect and classify malicious network traffic.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang W, Zhu M, Wang J, Zeng X, Yang Z (2017) End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE international conference on Intelligence and Security Informatics (ISI). IEEE, Piscataway, pp 43–48CrossRef Wang W, Zhu M, Wang J, Zeng X, Yang Z (2017) End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE international conference on Intelligence and Security Informatics (ISI). IEEE, Piscataway, pp 43–48CrossRef
2.
Zurück zum Zitat Krizhevsky A, Sutskever I, Hinton G (2012) ImageNet classification with deep convolutional neural networks. Adv Neural Inf Process Syst 2:1097–1105 Krizhevsky A, Sutskever I, Hinton G (2012) ImageNet classification with deep convolutional neural networks. Adv Neural Inf Process Syst 2:1097–1105
3.
Zurück zum Zitat Russakovsky O et al (2015) ImageNet large scale visual recognition challenge. Int J Comput Vis 115(3):211–252MathSciNetCrossRef Russakovsky O et al (2015) ImageNet large scale visual recognition challenge. Int J Comput Vis 115(3):211–252MathSciNetCrossRef
4.
Zurück zum Zitat Yoshioka T, Karita S, Nakatani T (2015) Far-field speech recognition using CNN-DNN-HMM with convolution in time. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, Piscataway, pp 4360–4364CrossRef Yoshioka T, Karita S, Nakatani T (2015) Far-field speech recognition using CNN-DNN-HMM with convolution in time. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, Piscataway, pp 4360–4364CrossRef
5.
Zurück zum Zitat Abdel-Hamid O, Mohamed A-R, Jiang H, Penn G (2012) Applying convolutional neural networks concepts to hybrid NN-HMM model for speech recognition. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, Piscataway, pp 4277–4280CrossRef Abdel-Hamid O, Mohamed A-R, Jiang H, Penn G (2012) Applying convolutional neural networks concepts to hybrid NN-HMM model for speech recognition. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, Piscataway, pp 4277–4280CrossRef
6.
Zurück zum Zitat Zhang X, LeCun Y (2017) Which encoding is the best for text classification in Chinese, English, Japanese and Korean? arXiv preprint arXiv:1708.02657 Zhang X, LeCun Y (2017) Which encoding is the best for text classification in Chinese, English, Japanese and Korean? arXiv preprint arXiv:1708.02657
7.
Zurück zum Zitat Zhang X, Zhao J, LeCun Y (2015) Character-level convolutional networks for text classification. Adv Neural Inf Process Syst 2015:649–657 Zhang X, Zhao J, LeCun Y (2015) Character-level convolutional networks for text classification. Adv Neural Inf Process Syst 2015:649–657
8.
Zurück zum Zitat Hershey S et al (2017) CNN architectures for large-scale audio classification. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, Piscataway, pp 131–135CrossRef Hershey S et al (2017) CNN architectures for large-scale audio classification. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, Piscataway, pp 131–135CrossRef
9.
Zurück zum Zitat Romaszko L (2015) Signal correlation prediction using convolutional neural networks. In: Neural connectomics workshop, pp 45–56 Romaszko L (2015) Signal correlation prediction using convolutional neural networks. In: Neural connectomics workshop, pp 45–56
10.
Zurück zum Zitat Chen Z, He K, Li J, Geng Y (2017) Seq2Img: a sequence-to-image based approach towards IP traffic classification using convolutional neural networks. In: 2017 IEEE international conference on big data (big data). IEEE, Piscataway, pp 1271–1276CrossRef Chen Z, He K, Li J, Geng Y (2017) Seq2Img: a sequence-to-image based approach towards IP traffic classification using convolutional neural networks. In: 2017 IEEE international conference on big data (big data). IEEE, Piscataway, pp 1271–1276CrossRef
11.
Zurück zum Zitat Zhou H, Wang Y, Lei X, Liu Y (2017) A method of improved CNN traffic classification. In: 2017 13th international conference on Computational Intelligence and Security (CIS). IEEE, Piscataway, pp 177–181CrossRef Zhou H, Wang Y, Lei X, Liu Y (2017) A method of improved CNN traffic classification. In: 2017 13th international conference on Computational Intelligence and Security (CIS). IEEE, Piscataway, pp 177–181CrossRef
12.
Zurück zum Zitat Wang W, Zhu M, Zeng X, Ye X, Sheng Y (2017) Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN). IEEE, Piscataway, pp 712–717CrossRef Wang W, Zhu M, Zeng X, Ye X, Sheng Y (2017) Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN). IEEE, Piscataway, pp 712–717CrossRef
13.
Zurück zum Zitat Millar K, Cheng A, Chew HG, Lim C-C (2018) Deep learning for classifying malicious network traffic. Presented at the Pacific-Asia conference on knowledge discovery and data mining, Melbourne, Australia Millar K, Cheng A, Chew HG, Lim C-C (2018) Deep learning for classifying malicious network traffic. Presented at the Pacific-Asia conference on knowledge discovery and data mining, Melbourne, Australia
14.
Zurück zum Zitat LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436–444CrossRef LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436–444CrossRef
15.
Zurück zum Zitat LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278–2324CrossRef LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278–2324CrossRef
16.
Zurück zum Zitat LeCun Y, Bengio Y (1995) Convolutional networks for images, speech, and time series. Handb Brain Theory Neural Netw 3361(10) LeCun Y, Bengio Y (1995) Convolutional networks for images, speech, and time series. Handb Brain Theory Neural Netw 3361(10)
17.
Zurück zum Zitat Dumoulin V, Visin F (2016) A guide to convolution arithmetic for deep learning Dumoulin V, Visin F (2016) A guide to convolution arithmetic for deep learning
18.
Zurück zum Zitat Marpaung JAP, Sain M, Hoon-Jae L (2012) Survey on malware evasion techniques: state of the art and challenges. In: 2012 14th International Conference on Advanced Communication Technology (ICACT). IEEE, Piscataway, pp 744–749 Marpaung JAP, Sain M, Hoon-Jae L (2012) Survey on malware evasion techniques: state of the art and challenges. In: 2012 14th International Conference on Advanced Communication Technology (ICACT). IEEE, Piscataway, pp 744–749
19.
Zurück zum Zitat Del Carlo C (2003) Intrusion detection evasion: how attackers get past the burglar alarm. SANS Great Lakes, Chicago Del Carlo C (2003) Intrusion detection evasion: how attackers get past the burglar alarm. SANS Great Lakes, Chicago
20.
Zurück zum Zitat Wang K, Stolfo SJ (2004) Anomalous payload-based network intrusion detection. In: International workshop on recent advances in intrusion detection. Springer, pp 203–222 Wang K, Stolfo SJ (2004) Anomalous payload-based network intrusion detection. In: International workshop on recent advances in intrusion detection. Springer, pp 203–222
21.
Zurück zum Zitat Wang Z (2015) The applications of deep learning on traffic identification. Black Hat USA Wang Z (2015) The applications of deep learning on traffic identification. Black Hat USA
22.
Zurück zum Zitat Aceto G, Dainotti A, Donato WD, Pescape A (2010) PortLoad: taking the best of two worlds in traffic classification. In: 2010 INFOCOM IEEE conference on computer communications workshops. IEEE, Piscataway, pp 1–5 Aceto G, Dainotti A, Donato WD, Pescape A (2010) PortLoad: taking the best of two worlds in traffic classification. In: 2010 INFOCOM IEEE conference on computer communications workshops. IEEE, Piscataway, pp 1–5
23.
Zurück zum Zitat Smit D, Millar K, Page C, Cheng A, Chew HG, Lim C-C (2017) Looking deeper – using deep learning to identify internet communications traffic. Presented at the Australasian Conference of Undergraduate Research (ACUR), Adelaide Smit D, Millar K, Page C, Cheng A, Chew HG, Lim C-C (2017) Looking deeper – using deep learning to identify internet communications traffic. Presented at the Australasian Conference of Undergraduate Research (ACUR), Adelaide
24.
Zurück zum Zitat Bromley J, Guyon I, LeCun Y, Säckinger E, Shah R (1994) Signature verification using a “Siamese” time delay neural network. Adv Neural Inf Process Syst 6:737–744 Bromley J, Guyon I, LeCun Y, Säckinger E, Shah R (1994) Signature verification using a “Siamese” time delay neural network. Adv Neural Inf Process Syst 6:737–744
25.
Zurück zum Zitat Nour M, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference (MilCIS). EEE, Piscataway Nour M, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference (MilCIS). EEE, Piscataway
26.
Zurück zum Zitat Nour M, Slay J (2016) The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 Sata set and the comparison with the KDD99 data set. In: Inf Secur J: Glob Perspect, pp 1–14 Nour M, Slay J (2016) The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 Sata set and the comparison with the KDD99 data set. In: Inf Secur J: Glob Perspect, pp 1–14
27.
Zurück zum Zitat Martín A et al (2016) TensorFlow: a system for large-scale machine learning. OSDI 16: 265–283 Martín A et al (2016) TensorFlow: a system for large-scale machine learning. OSDI 16: 265–283
Metadaten
Titel
Using Convolutional Neural Networks for Classifying Malicious Network Traffic
verfasst von
Kyle Millar
Adriel Cheng
Hong Gunn Chew
Cheng-Chew Lim
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-13057-2_5

Premium Partner