Data-Driven Cyber Security in Perspective-Intelligent Traffic Analysis

被引:78
作者
Coulter, Rory [1 ]
Han, Qing-Long [1 ]
Pan, Lei [2 ]
Zhang, Jun [1 ]
Xiang, Yang [1 ]
机构
[1] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
[2] Deakin Univ, Sch Informat Technol, Geelong, Vic 3220, Australia
基金
澳大利亚研究理事会;
关键词
Computer crime; Feature extraction; Internet; Data models; Twitter; Cyber security; Internet traffic analysis; machine learning (ML); social spam detection; SPAM; INFORMATION; PERFORMANCE; SYSTEM; CLASSIFICATION; THREATS; DESIGN; WORLD;
D O I
10.1109/TCYB.2019.2940940
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social and Internet traffic analysis is fundamental in detecting and defending cyber attacks. Traditional approaches resorting to manually defined rules are gradually replaced by automated approaches empowered by machine learning. This revolution is accelerated by huge datasets which support machine-learning models with outstanding performance. In the context of a data-driven paradigm, this article reviews recent analytic research on cyber traffic over social networks and the Internet by using a set of common concepts of similarity, correlation, and collective indication, and by sharing security goals for classifying network host or applications and users or Tweets. The ability to do so is not determined in isolation, but rather drawn for a wide use of many different network or social flows. Furthermore, the flows exhibit many characteristics, such as fixed sized and multiple messages between source and destination. This article demonstrates a new research methodology of data-driven cyber security (DDCS) and its application in social and Internet traffic analysis. The framework of the DDCS methodology consists of three components, that is, cyber security data processing, cyber security feature engineering, and cyber security modeling. Challenges and future directions in this field are also discussed.
引用
收藏
页码:3081 / 3093
页数:13
相关论文
共 90 条
[1]  
[Anonymous], 2006, SIGCOMM Workshop on Mining Network Data, page, DOI DOI 10.1145/1162678.1162679
[2]  
[Anonymous], SMART TRANSMISSION G
[3]  
[Anonymous], IN DEPTH ANAL ABUSE
[4]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[5]   Bayesian neural networks for Internet traffic classification [J].
Auld, Tom ;
Moore, Andrew W. ;
Gull, Stephen F. .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2007, 18 (01) :223-239
[6]  
Benevenuto F., 2010, COLL EL MESS ANT SPA, V6, P1
[7]   Representation Learning: A Review and New Perspectives [J].
Bengio, Yoshua ;
Courville, Aaron ;
Vincent, Pascal .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (08) :1798-1828
[8]   Traffic classification on the fly [J].
Bernaille, Laurent ;
Teixeira, Renata ;
Akodkenou, Ismael ;
Soule, Augustin ;
Salamatian, Kave .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (02) :23-26
[9]  
Bishop CM., 2006, Springer Google Schola, V2, P1122, DOI [10.5555/1162264, DOI 10.18637/JSS.V017.B05]
[10]  
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792