Inicio  /  Applied Sciences  /  Vol: 9 Par: 16 (2019)  /  Artículo
ARTÍCULO
TITULO

An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level

Ren-Hung Hwang    
Min-Chun Peng    
Van-Linh Nguyen and Yu-Lun Chang    

Resumen

Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify malicious traffic. However, these state-of-the-art systems also face tremendous challenges to satisfy real-time analysis requirements due to the major delay of the flow-based data preprocessing, i.e., requiring time for accumulating the packets into particular flows and then extracting features. If detecting malicious traffic can be done at the packet level, detecting time will be significantly reduced, which makes the online real-time malicious traffic detection based on deep learning technologies become very promising. With the goal of accelerating the whole detection process by considering a packet level classification, which has not been studied in the literature, in this research, we propose a novel approach in building the malicious classification system with the primary support of word embedding and the LSTM model. Specifically, we propose a novel word embedding mechanism to extract packet semantic meanings and adopt LSTM to learn the temporal relation among fields in the packet header and for further classifying whether an incoming packet is normal or a part of malicious traffic. The evaluation results on ISCX2012, USTC-TFC2016, IoT dataset from Robert Gordon University and IoT dataset collected on our Mirai Botnet show that our approach is competitive to the prior literature which detects malicious traffic at the flow level. While the network traffic is booming year by year, our first attempt can inspire the research community to exploit the advantages of deep learning to build effective IDSs without suffering significant detection delay.

 Artículos similares

       
 
Hongseob Bae and Jaesung Park    
Optimizingthe cache hit rate in a multi-access edge computing (MEC) system is essential in increasing the utility of a system. A pivotal challenge within this context lies in predicting the popularity of a service. However, accurately predicting popular ... ver más
Revista: Applied Sciences

 
Khalid Alkhatib, Huthaifa Khazaleh, Hamzah Ali Alkhazaleh, Anas Ratib Alsoud and Laith Abualigah    
Stock price prediction is a significant research field due to its importance in terms of benefits for individuals, corporations, and governments. This research explores the application of the new approach to predict the adjusted closing price of a specif... ver más

 
Jinah Kim and Nammee Moon    
Although various studies on monitoring dog behavior have been conducted, methods that can minimize or compensate data noise are required. This paper proposes multimodal data-based dog behavior recognition that fuses video and sensor data using a camera a... ver más
Revista: Applied Sciences

 
Benjamin Plaster and Gautam Kumar    
Modeling brain dynamics to better understand and control complex behaviors underlying various cognitive brain functions have been of interest to engineers, mathematicians and physicists over the last several decades. With the motivation of developing com... ver más
Revista: Algorithms

 
Xiaocong Wei, Hongfei Lin, Liang Yang and Yuhai Yu    
Learners in a massive open online course often express feelings, exchange ideas and seek help by posting questions in discussion forums. Due to the very high learner-to-instructor ratios, it is unrealistic to expect instructors to adequately track the fo... ver más
Revista: Information