Frequency Domain Feature Based Robust Malicious Traffic Detection

被引:20
|
作者
Fu, Chuanpu [1 ]
Li, Qi [2 ,3 ,4 ]
Shen, Meng
Xu, Ke [1 ,2 ,4 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] Tsinghua Univ, Beijing Natl Res Ctr Informat Sci & Technol BNRis, Beijing 100084, Peoples R China
[3] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing 100084, Peoples R China
[4] Zhongguancun Lab, Beijing 100094, Peoples R China
关键词
Feature extraction; Frequency-domain analysis; Throughput; Machine learning; Encoding; Data mining; Redundancy; Malicious traffic detection; machine learning; frequency domain; SERVICE ATTACKS; DDOS DEFENSE; NETWORK; TCP; CLASSIFICATION;
D O I
10.1109/TNET.2022.3195871
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) based malicious traffic detection is an emerging security paradigm, particularly for zero-day attack detection, which is complementary to existing rule based detection. However, the existing ML based detection achieves low detection accuracy and low throughput incurred by inefficient traffic features extraction. Thus, they cannot detect attacks in realtime, especially in high throughput networks. Particularly, these detection systems similar to the existing rule based detection can be easily evaded by sophisticated attacks. To this end, we propose, a realtime ML based malicious traffic detection system that achieves both high accuracy and high throughput by utilizing frequency domain features. It utilizes sequential information represented by the frequency domain features to achieve bounded information loss, which ensures high detection accuracy, and meanwhile constrains the scale of features to achieve high detection throughput. In particular, attackers cannot easily interfere with the frequency domain features and thus is robust against various evasion attacks. Our experiments with 74 types of attacks demonstrate that, compared with the state-of-the-art systems, can accurately detect various sophisticated and stealthy attacks, achieving at most 18.36% improvement of AUC, while achieving two orders of magnitude throughput. Even under various evasion attacks, is still able to maintain around 90% detection accuracy.
引用
收藏
页码:452 / 467
页数:16
相关论文
共 50 条
  • [1] Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis
    Fu, Chuanpu
    Li, Qi
    Shen, Meng
    Xu, Ke
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 3431 - 3446
  • [2] REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis
    Lin, Wanshuang
    Xia, Chunhe
    Wang, Tianbo
    Chen, Chen
    Zhao, Yuan
    Zhou, Weidong
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 668 - 675
  • [3] An Effective Feature Selection Algorithm for Machine Learning-based Malicious Traffic Detection
    Fei, Chao
    Xia, Nian
    Tsai, Pang-Wei
    Lu, Yang
    Pan, Xiaonan
    Gong, Junli
    2024 19TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS 2024, 2024, : 91 - 98
  • [4] Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning
    Hu, Zhenguo
    Hasegawa, Hirokazu
    Yamaguchi, Yukiko
    Shimada, Hajime
    IEEE ACCESS, 2024, 12 : 2648 - 2659
  • [5] XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering
    Al-Fayoumi, Mustafa
    Abu Al-Haija, Qasem
    Armoush, Rakan
    Amareen, Christine
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2024, 21 (01) : 128 - 146
  • [6] ECNet: Robust Malicious Network Traffic Detection With Multi-View Feature and Confidence Mechanism
    Han, Xueying
    Liu, Song
    Liu, Junrong
    Jiang, Bo
    Lu, Zhigang
    Liu, Baoxu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6871 - 6885
  • [7] Feature analysis of encrypted malicious traffic
    Shekhawat, Anish Singh
    Di Troia, Fabio
    Stamp, Mark
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 125 : 130 - 141
  • [8] MADMAX: Browser-Based Malicious Domain Detection Through Extreme Learning Machine
    Iwahana, Kazuki
    Takemura, Tatsuya
    Cheng, Ju Chien
    Ashizawa, Nami
    Umeda, Naoki
    Sato, Kodai
    Kawakami, Ryota
    Shimizu, Rei
    Chinen, Yuichiro
    Yanai, Naoto
    IEEE ACCESS, 2021, 9 (09): : 78293 - 78314
  • [9] BoAu: Malicious traffic detection with noise labels based on boundary augmentation
    Yuan, Qingjun
    Liu, Chang
    Yu, Wentao
    Zhu, Yuefei
    Xiong, Gang
    Wang, Yongjuan
    Gou, Gaopeng
    COMPUTERS & SECURITY, 2023, 131
  • [10] Malicious Domain Detection Based on Decision Tree
    Thein, Thin Tharaphe
    Shiraishi, Yoshiaki
    Morii, Masakatu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (09) : 1490 - 1494