Research Output
A novel flow-vector generation approach for malicious traffic detection
  Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefiting from the development of deep learning techniques, raw traffic can be directly used as a feature to detect malicious traffic. Most existing work usually converts raw traffic into images or long sequences to express a flow and then uses deep learning technology to extract features and classify them, but the generated features contain much redundant or even useless information, especially for encrypted traffic. The packet header field contains most of the packet characteristics except the payload content, and it is also an important element of the flow. In this paper, we only use the fields of the packet header in the raw traffic to construct the characteristic representation of the traffic and propose a novel flow-vector generation approach for malicious traffic detection. The preprocessed header fields are embedded as field vectors, and then a two-layer attention network is used to progressively generate the packet vectors and the flow vector containing context information. The flow vector is regarded as the abstraction of the raw traffic and is used to classify. The experiment results illustrate that the accuracy rate can reach up to 99.48% in the binary classification task and the average of AUC-ROC can reach 0.9988 in the multi-classification task.

  • Type:

    Article

  • Date:

    20 June 2022

  • Publication Status:

    Published

  • DOI:

    10.1016/j.jpdc.2022.06.004

  • ISSN:

    0743-7315

  • Funders:

    Edinburgh Napier Funded; National Natural Science Foundation of China

Citation

Hou, J., Liu, F., Lu, H., Tan, Z., Zhuang, X., & Tian, Z. (2022). A novel flow-vector generation approach for malicious traffic detection. Journal of Parallel and Distributed Computing, 169, 72-86. https://doi.org/10.1016/j.jpdc.2022.06.004

Authors

Keywords

Deep Learning, Malicious Traffic, Embedding, Attention Mechanism

Monthly Views:

Available Documents