Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion

被引:16
作者
Agrafiotis, Giorgos [1 ]
Makri, Eftychia [1 ]
Flionis, Ioannis [1 ]
Lalas, Antonios [1 ]
Votis, Konstantinos [1 ]
Tzovaras, Dimitrios [1 ]
机构
[1] Informat Technol Inst, Ctr Res & Technol Hellas, Thessaloniki, Greece
来源
PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022 | 2022年
基金
欧盟地平线“2020”;
关键词
neural networks; 5G networks; security; network anomaly detection; intrusion detection; ids2017; convolutional neural networks; vision transformer;
D O I
10.1145/3538969.3544473
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traffic categorization is considered of paramount importance in the network security sector, as well as the first stage in network anomaly detection, or in a network-based intrusion detection system (IDS). This paper introduces an artificial intelligence (AI) network traffic classification pipeline, including the employment of state-of-the-art image-based neural network models, namely Vision Transformers (ViT) and Convolutional Neural Networks (CNN), whereas the primary element of this pipeline is the transformation of raw traffic data into grayscale pictures introducing a properly developed IDS-Vision Toolkit as well. This approach extracts characteristics from network traffic data without requiring domain expertise and could be easily adapted to new network protocols and technologies (i.e. 5G). Furthermore, the proposed method was tested on the CIC-IDS-2017 dataset and compared to a well-known feature extraction strategy on the same dataset. Finally, it surpasses all suggested binary classification algorithms for the CIC-IDS-2017 dataset to the best of our knowledge, paving the path for further exploitation in the 5G domain to successfully address related cybersecurity challenges.
引用
收藏
页数:7
相关论文
共 24 条
[1]  
Alamri HA, 2021, Int. J. Comput. Appl, V174, P9, DOI 10.5120/ijca2021921027
[2]   An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IoT Healthcare Applications [J].
Anand, Ankita ;
Rani, Shalli ;
Anand, Divya ;
Aljahdali, Hani Moaiteq ;
Kerr, Dermot .
SENSORS, 2021, 21 (19)
[3]  
Batas S., 2020, Huawei White Paper
[4]  
Beyer L., 2022, arXiv, DOI 10.48550/arXiv.2205.01580
[5]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[6]  
Breiman L, 1996, MACH LEARN, V24, P123, DOI 10.1023/A:1018054314350
[7]  
Celik ZB, 2015, IEEE MILIT COMMUN C, P330, DOI 10.1109/MILCOM.2015.7357464
[8]  
Chua TH, 2022, arXiv
[9]  
CTU University, 2022, The Stratosphere IPS Project Dataset
[10]  
Dosovitskiy A, 2021, Arxiv, DOI [arXiv:2010.11929, DOI 10.48550/ARXIV.2010.11929]