An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level

被引:84
作者
Hwang, Ren-Hung [1 ]
Peng, Min-Chun [1 ]
Van-Linh Nguyen [1 ]
Chang, Yu-Lun [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 62102, Taiwan
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 16期
关键词
deep learning for network security; long short-term memory; malicious traffic classification; NETWORK;
D O I
10.3390/app9163414
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify malicious traffic. However, these state-of-the-art systems also face tremendous challenges to satisfy real-time analysis requirements due to the major delay of the flow-based data preprocessing, i.e., requiring time for accumulating the packets into particular flows and then extracting features. If detecting malicious traffic can be done at the packet level, detecting time will be significantly reduced, which makes the online real-time malicious traffic detection based on deep learning technologies become very promising. With the goal of accelerating the whole detection process by considering a packet level classification, which has not been studied in the literature, in this research, we propose a novel approach in building the malicious classification system with the primary support of word embedding and the LSTM model. Specifically, we propose a novel word embedding mechanism to extract packet semantic meanings and adopt LSTM to learn the temporal relation among fields in the packet header and for further classifying whether an incoming packet is normal or a part of malicious traffic. The evaluation results on ISCX2012, USTC-TFC2016, IoT dataset from Robert Gordon University and IoT dataset collected on our Mirai Botnet show that our approach is competitive to the prior literature which detects malicious traffic at the flow level. While the network traffic is booming year by year, our first attempt can inspire the research community to exploit the advantages of deep learning to build effective IDSs without suffering significant detection delay.
引用
收藏
页数:14
相关论文
共 20 条
  • [1] Deep Learning for Malicious Flow Detection
    Chen, Yun-Chun
    Li, Yu-Jhe
    Tseng, Aragorn
    Lin, Tsungnan
    [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [2] WEDL-NIDS: Improving Network Intrusion Detection Using Word Embedding-Based Deep Learning Method
    Cui, Jianjing
    Long, Jun
    Min, Erxue
    Mao, Yugang
    [J]. MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE (MDAI 2018), 2018, 11144 : 283 - 295
  • [3] Fu R, 2016, 2016 31ST YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), P324, DOI 10.1109/YAC.2016.7804912
  • [4] Goldberg Y., 2013, ARXIV14023722
  • [5] Detecting IoT Malicious Traffic based on Autoencoder and Convolutional Neural Network
    Hwang, Ren-Hung
    Peng, Min-Chun
    Huang, Chien-Wei
    [J]. 2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [6] Javaid A., 2016, P 9 EAI INT C BIOINS, V3, P2, DOI [DOI 10.4108/EAI.3-12-2015.2262516, 10.4108/eai.3-12-2015.2262516]
  • [7] A flow-based method for abnormal network traffic detection
    Kim, MS
    Kang, HJ
    Hong, SC
    Chung, SH
    Hong, JW
    [J]. NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 599 - 612
  • [8] Using a Recurrent Neural Network and Restricted Boltzmann Machines for Malicious Traffic Detection
    Li, Chaopeng
    Wang, Jinlin
    Ye, Xiaozhou
    [J]. NEUROQUANTOLOGY, 2018, 16 (05) : 823 - 831
  • [9] McDermott CD, 2018, IEEE IJCNN
  • [10] N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
    Meidan, Yair
    Bohadana, Michael
    Mathov, Yael
    Mirsky, Yisroel
    Shabtai, Asaf
    Breitenbacher, Dominik
    Elovici, Yuval
    [J]. IEEE PERVASIVE COMPUTING, 2018, 17 (03) : 12 - 22