skip to main content
10.1145/3467707.3467746acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccaiConference Proceedingsconference-collections
research-article

Research on CNN-Based Malicious Traffic Identification Method

Authors Info & Claims
Published:24 September 2021Publication History

ABSTRACT

Today's Internet environment is full of all kinds of normal and malicious traffic, how to identify the feature categories of malicious traffic plays a crucial role in network management and security. With the rapid growth of modern Internet traffic, classical machine learning methods are limited by efficiency and functionality and are no longer sufficient to deal with large and complex network traffic. Thus, we propose a convolutional neural network-based traffic identification method. Firstly, the full traffic dataset for testing is preprocessed with one-hot coding. Secondly, a convolutional neural network model is built for testing, a softmax classifier is used to detect and classify the normal traffic and various malicious traffic, and finally, obtain the classification results of each traffic type. The experimental tests on the publicly available dataset show that the detection accuracy of malicious traffic is close to 99%, and the loss value is less than 1%.

References

  1. CNNIC 2020 Statistical Reports on Internet Development in China[R].2020.Google ScholarGoogle Scholar
  2. J Ran, Y Chen, S Li. Three-Dimensional Convolutional Neural Network Based Traffic Classification for Wireless Communications[C]. 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2018.Google ScholarGoogle ScholarCross RefCross Ref
  3. H Lim, J Kim, J Heo, Packet-based Network Traffic Classification Using Deep Learning[C]. 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIC), 2019.Google ScholarGoogle Scholar
  4. Wei Wang, Ming Zhu, Xuewen Zeng, Malware Traffic Classification Using Convolutional Neural Network for Representation Learning[C], 2017 International Conference on Information Networking (ICOIN), 2017.Google ScholarGoogle Scholar
  5. WANG Yong, ZHOU Huiyi, FENG Hao, Network traffic classification method based on deep convolution neural network [J]. Acta communication Sinica, 2018, 39(1):14-23.Google ScholarGoogle Scholar
  6. CHEN Xuejiao, WANG pan, YU Jiahui. Encrypted traffic identification method based on the convolutional neural network [J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2018, 38(6):36-41.Google ScholarGoogle Scholar
  7. Jain A V. Network Traffic Identification with Convolutional Neural Networks[C]// DASC: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 2018.Google ScholarGoogle Scholar
  8. J Ren, Z Wang. A novel deep learning method for application identification in the wireless network[J]. China Communications, 2018, 15(10):73-83.Google ScholarGoogle ScholarCross RefCross Ref
  9. Wu Kehe, Chen Zuge, Li Wei. Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks[C]. IEEE Access, 2018.Google ScholarGoogle Scholar
  10. GHARIB A, SHARAFALDIN I, HABIBI L A, An evaluation framework for intrusion detection dataset[C]//2016 International Conference on Information Science and Security (ICISS). 2016:1-6.Google ScholarGoogle Scholar
  11. M. F. Zolkipli and A. Jantan, “An approach for malware behavior identification and classification,” in computer Research and Development(ICCRD), 2011 3rd International Conference on, 2011, vol. 1, pp. 191–194.Google ScholarGoogle Scholar
  12. Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee. Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proceedings of the 17th Conference on Security Symposium, SS’08, pages 139–154, Berkeley, CA, USA, 2008.Google ScholarGoogle Scholar
  13. Mohsen Damshenas, Ali Dehghantanha, and Ramlan Mahmoud. A survey on malware propagation, analysis, and detection. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2 (4): 10–29, 2013.Google ScholarGoogle Scholar
  14. Anoop Chowdary Atluri and Vinh Tran. Botnets threat analysis and detection. In Information Security Practices, pages 7–28. Springer International Publishing, 2017.Google ScholarGoogle Scholar
  15. Gao, M.; Ma, L.; Liu, H.; Zhang, Z.; Ning, Z.; Xu, J. Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis. Sensors 2020, 20, 1452.Google ScholarGoogle Scholar
  16. T. T. Nguyen and G. A Armitage, "Survey of Techniques for Internet Traffic Classification using Machine Learning", IEEE Communications Surveys & Tutorials, vol. 10, no. 4, pp. 56-76, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICCAI '21: Proceedings of the 2021 7th International Conference on Computing and Artificial Intelligence
    April 2021
    498 pages
    ISBN:9781450389501
    DOI:10.1145/3467707

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 24 September 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)24
    • Downloads (Last 6 weeks)3

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format