Research on malicious traffic detection based on image recognition

被引:1
作者
Li, Wei [1 ]
Chen, Yuliang [2 ]
Zhao, Lixin [1 ]
Luo, Yazhou [1 ]
Liu, Xin [2 ]
机构
[1] North China Branch State Grid Corp China, Beijing, Peoples R China
[2] Lanzhou Univ, Sch Informat Sci & Engn, Lanzhou, Gansu, Peoples R China
关键词
web attack; malicious traffic detection; image recognition; convolutional neural network; CNN; INTRUSION-DETECTION; ATTACK DETECTION; NETWORK;
D O I
10.1504/IJES.2023.136387
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the internet, information security problems caused by malicious traffic are becoming more and more serious. Malicious traffic invades the target system, interferes with the regular operation of the target internet device, steals user privacy, and destroys network availability. Therefore, this paper proposes a malicious traffic detection method based on image recognition technology, which is used to detect network traffic data, mine malicious traffic, provide early warning for users, and avoid network security threats. Based on the feature extraction of the text information of the network traffic data, the method converts the string data of the network traffic into picture data containing feature information, and combines the convolutional neural network (CNN) to realise the analysis of the attack vector detection on network traffic. Experimental results show that, compared with traditional machine learning methods, this method has a more efficient and accurate identification ability for malicious traffic attacks.
引用
收藏
页码:134 / 142
页数:10
相关论文
共 42 条
[1]   An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection [J].
Aldwairi, Tamer ;
Perera, Dilina ;
Novotny, Mark A. .
COMPUTER NETWORKS, 2018, 144 :111-119
[2]   Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
SECURITY AND PRIVACY, 2018, 1 (04)
[3]  
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[4]  
Chen L., 2019, Journal of Huazhong University of Science and Technology (Natural Science Edition), P5, DOI [10.13245/j.hust.190406, DOI 10.13245/J.HUST.190406]
[5]   Application of SVM and ANN for intrusion detection [J].
Chen, WH ;
Hsu, SH ;
Shen, HP .
COMPUTERS & OPERATIONS RESEARCH, 2005, 32 (10) :2617-2634
[6]  
Chen Z., 2022, The Research on Malicious Traffic Detection Based on Image Processing
[7]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[8]   Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection [J].
Doriguzzi-Corin, R. ;
Millar, S. ;
Scott-Hayward, S. ;
Martinez-del-Rincon, J. ;
Siracusa, D. .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02) :876-889
[9]   Intrusion Detection System Using Voting-Based Neural Network [J].
Haghighat, Mohammad Hashem ;
Li, Jun .
TSINGHUA SCIENCE AND TECHNOLOGY, 2021, 26 (04) :484-495
[10]   Network intrusion detection system based on recursive feature addition and bigram technique [J].
Hamed, Tarfa ;
Dara, Rozita ;
Kremer, Stefan C. .
COMPUTERS & SECURITY, 2018, 73 :137-155