Skip to main content

2020 | OriginalPaper | Buchkapitel

Malicious-Traffic Classification Using Deep Learning with Packet Bytes and Arrival Time

verfasst von : Ingyom Kim, Tai-Myoung Chung

Erschienen in: Future Data and Security Engineering

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet technology is rapidly developing through the development of computer technology. However, we haven been experiencing problems such as malware with these developments. Various methods of malware detection have been studied for years to respond to malicious codes. There are three main ways to classify traffic. They are port-based, payload-based and a machine learning method. We attempt to classify malicious traffic using CNN which is one of deep learning algorithms. The features we use for CNN are the packet’s size and its arrival time. The packet’s size and arrival time information are extracted and then converted into an image file. The converted image is then used for CNN to classify what type of attack the traffic is. The accuracy of the proposed technique was 95%, which showed very high performance, proving that classification was possible.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tidjon, L.N., Frappier, M., Mammar, A.: Intrusion detection systems: a cross domain overview. IEEE Commun. Surv. Tutor. 21, 3639–3681 (2019)CrossRef Tidjon, L.N., Frappier, M., Mammar, A.: Intrusion detection systems: a cross domain overview. IEEE Commun. Surv. Tutor. 21, 3639–3681 (2019)CrossRef
2.
Zurück zum Zitat Auld, T., Moore, A.W., Gull, S.F.: Bayesian neural networks for internet traffic classification. IEEE Trans. Neural Netw. 18(1), 223–239 (2007)CrossRef Auld, T., Moore, A.W., Gull, S.F.: Bayesian neural networks for internet traffic classification. IEEE Trans. Neural Netw. 18(1), 223–239 (2007)CrossRef
3.
Zurück zum Zitat Crotti, M., et al.: Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Comput. Commun. Rev. 37(1), 5–16 (2007)CrossRef Crotti, M., et al.: Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Comput. Commun. Rev. 37(1), 5–16 (2007)CrossRef
4.
Zurück zum Zitat Wagh, S.K., Pachghare, V.K., Kolhe, S.R.: Survey on intrusion detection system using machine learning techniques. Int. J. Comput. Appl. 78(16), 30–37 (2013) Wagh, S.K., Pachghare, V.K., Kolhe, S.R.: Survey on intrusion detection system using machine learning techniques. Int. J. Comput. Appl. 78(16), 30–37 (2013)
5.
Zurück zum Zitat Alhakami, W., et al.: Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection. IEEE Access 7, 52181–52190 (2019)CrossRef Alhakami, W., et al.: Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection. IEEE Access 7, 52181–52190 (2019)CrossRef
6.
Zurück zum Zitat Shin, D., Choi, K., Chune, S., Choi, H.: Malicious traffic detection using K-means. J. Korean Inst. Commun. Inf. Sci. 41(2), 277–284 (2016) Shin, D., Choi, K., Chune, S., Choi, H.: Malicious traffic detection using K-means. J. Korean Inst. Commun. Inf. Sci. 41(2), 277–284 (2016)
7.
Zurück zum Zitat Tahir, M., et al.: Hybrid machine learning technique for intrusion detection system. In: 5th International Conference on Computing and Informatics (ICOCI) (2015) Tahir, M., et al.: Hybrid machine learning technique for intrusion detection system. In: 5th International Conference on Computing and Informatics (ICOCI) (2015)
8.
Zurück zum Zitat Gao, N., Gao, L., Gao, Q., Wang, H.: An intrusion detection model based on deep belief networks. In: 2014 2nd International Conference on Advanced Cloud and Big Data (CBD), pp. 247–252 (2014) Gao, N., Gao, L., Gao, Q., Wang, H.: An intrusion detection model based on deep belief networks. In: 2014 2nd International Conference on Advanced Cloud and Big Data (CBD), pp. 247–252 (2014)
9.
Zurück zum Zitat Jo, S., Sung, H., Ahn, B.: A comparative study on the performance of SVM and an artificial neural network in intrusion detection. J. Korea Acad. Ind. Coop. Soc. 17(2), 703–711 (2016) Jo, S., Sung, H., Ahn, B.: A comparative study on the performance of SVM and an artificial neural network in intrusion detection. J. Korea Acad. Ind. Coop. Soc. 17(2), 703–711 (2016)
11.
Zurück zum Zitat Mathai, K.J.: Performance comparison of intrusion detection system between deep belief network (DBN) algorithm and state preserving extreme learning machine (SPELM) algorithm. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE (2019) Mathai, K.J.: Performance comparison of intrusion detection system between deep belief network (DBN) algorithm and state preserving extreme learning machine (SPELM) algorithm. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE (2019)
12.
Zurück zum Zitat Aggarwal, P., Dahiya, D.: Contribution of four class labeled attributes of kdd dataset on detection and false alarm rate for intrusion detection system. Indian J. Sci. Technol. 9(5), 1–8 (2016)CrossRef Aggarwal, P., Dahiya, D.: Contribution of four class labeled attributes of kdd dataset on detection and false alarm rate for intrusion detection system. Indian J. Sci. Technol. 9(5), 1–8 (2016)CrossRef
13.
Zurück zum Zitat Gurung, S., Ghose, M.K., Subedi, A.: Deep learning approach on network intrusion detection system using NSL-KDD dataset. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 11(3), 8–14 (2019) Gurung, S., Ghose, M.K., Subedi, A.: Deep learning approach on network intrusion detection system using NSL-KDD dataset. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 11(3), 8–14 (2019)
14.
Zurück zum Zitat Lippmann, R.P., et al.: Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In: Proceedings DARPA Information Survivability Conference and Exposition, DISCEX 2000, vol. 2. IEEE (2000) Lippmann, R.P., et al.: Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In: Proceedings DARPA Information Survivability Conference and Exposition, DISCEX 2000, vol. 2. IEEE (2000)
15.
Zurück zum Zitat Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. In: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust, vol. 94 (2005) Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. In: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust, vol. 94 (2005)
16.
Zurück zum Zitat Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4(6), 446–452 (2015) Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4(6), 446–452 (2015)
17.
Zurück zum Zitat Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE (2015) Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE (2015)
19.
Zurück zum Zitat Velea, R., Apostol, I., Patriciu, V.: LightPcapNg: implementing a library for general-purpose tracing based on PcapNg. In: 2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY). IEEE (2016) Velea, R., Apostol, I., Patriciu, V.: LightPcapNg: implementing a library for general-purpose tracing based on PcapNg. In: 2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY). IEEE (2016)
20.
Zurück zum Zitat LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436–444 (2015)CrossRef LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436–444 (2015)CrossRef
Metadaten
Titel
Malicious-Traffic Classification Using Deep Learning with Packet Bytes and Arrival Time
verfasst von
Ingyom Kim
Tai-Myoung Chung
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-63924-2_20

Premium Partner