Malicious Traffic classification Using Long Short-Term Memory (LSTM) Model

被引:1
作者
K. Naresh Kumar Thapa
N. Duraipandian
机构
[1] R.M.K. Engineering College,Department of ECE
[2] Anna University,Department of CSE
[3] Velammal Engineering College,undefined
来源
Wireless Personal Communications | 2021年 / 119卷
关键词
LSTM; Traffic classification; Artificial intelligence; Malicious traffic;
D O I
暂无
中图分类号
学科分类号
摘要
Malicious traffic classification is the initial and primary step for any network-based security systems. This traffic classification systems include behavior-based anomaly detection system and Intrusion Detection System. Existing methods always relies on the conventional techniques and process the data in the fixed sequence, which may leads to performance issues. Furthermore, conventional techniques require proper annotation to process the volumetric data. Relying on the data annotation for efficient traffic classification may leads to network loops and bandwidth issues within the network. To address the above-mentioned issues, this paper presents a novel solution based on artificial intelligence perspective. The key idea of this paper is to propose a novel malicious classification system using Long Short-Term Memory (LSTM) model. To validate the efficiency of the proposed model, an experimental setup along with experimental validation is carried out. From the experimental results, it is proven that the proposed model is better in terms of accuracy, throughput when compared to the state-of-the-art models. Further, the accuracy of the proposed model outperforms the existing state of the art models with increase in 5% and overall 99.5% in accuracy.
引用
收藏
页码:2707 / 2724
页数:17
相关论文
共 44 条
[1]  
Hafeez I(2020)IoT-KEEPER: detecting malicious IoT network activity using online traffic analysis at the edge IEEE Transactions on Network and Service Management 17 45-59
[2]  
Antikainen M(2019)Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine IET Information Security 13 109-116
[3]  
Ding AY(2019)Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks IET Networks 8 219-232
[4]  
Tarkoma S(2019)An intrusion detection model based on feature reduction and convolutional neural networks IEEE Access 7 42210-42219
[5]  
Han W(2008)AdaBoost-based algorithm for network intrusion detection IEEE Transactions on Systems, Man, and Cybernetics Part B (Cybernetics) 38 577-583
[6]  
Xue J(2015)Developing a hybrid intrusion detection system using data mining for power systems IEEE Transactions on Smart Grid 6 3104-3113
[7]  
Yan H(2012)Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers Security and Communication Networkscurity 5 3-14
[8]  
Sethuraman SC(2019)Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance Computer Communications 147 50-57
[9]  
Dhamodaran S(2019)Role based policy to maintain privacy of patient health records in cloud Journal of Super Computing 75 5866-5881
[10]  
Vijayakumar V(2020)Health care data analysis using evolutionary algorithm Journal of Supercomputing. 76 4262-4271