skip to main content
10.1145/3484824.3484891acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdsmlaiConference Proceedingsconference-collections
research-article

Honeypot Behaviour Patterns Learning for Mass Email Marketing Detection

Authors Info & Claims
Published:13 January 2022Publication History

ABSTRACT

The use of deep learning in detecting network attacks is widely adopted. However, supervised learning requires labeled training data to learn behaviour of honeypot in honeynet. This research studies the problem of learning patterns from honeypot behaviour to validate mass email marketing. Honeypots are deceiving, and their behaviour are the sources of security data for cyber-security research. Deep learning models are explored to learn behaviour from labeled time series of sequences of security events collected from production virtual Local Area Network. Evaluation on deception demonstrates detection of mass email marketing using Multilayer Perceptron Neural Networks with an accuracy of 87%.

References

  1. Alaidaros, H., & Mahmuddin, M. (2017). Flow-Based Approach on Bro Intrusion Detection. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-2), 139--145. Retrieved from https://jtec.utem.edu.my/jtec/article/view/2234Google ScholarGoogle Scholar
  2. Albahar, M. A. (2019). Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments. 2019(D1).Google ScholarGoogle Scholar
  3. Fedynyshyn, G., Chuah, M. C., & Tan, G. (2014). Detection and Classification of Different Botnet C & C Channels Detection and Classification of Different Botnet C & C Channels. May. https://doi.org/10.1007/978-3-642-23496-5Google ScholarGoogle ScholarCross RefCross Ref
  4. Gavrilov, A. D., Jordache, A., Vasdani, M., & Deng, J. (2019). Preventing Model Overfitting and Underfitting in Convolutional Neural Networks. International Journal of Software Science and Computational Intelligence, 10(4), 19--28. https://doi.org/10.4018/ijssci.2018100102.Google ScholarGoogle ScholarCross RefCross Ref
  5. Hinton, N. S. G., Sutskever, A. K. I., & Salakhutdinov, R. (2014). Dropout: A Simple Way to Prevent Neural Networks from Overfitting. Journal of Machine Learning Research, 56(15), 1929--1958. https://doi.org/10.1016/0370-2693(93)90272-J.Google ScholarGoogle ScholarCross RefCross Ref
  6. Hwang, R. H., Peng, M. C., Nguyen, V. L., & Chang, Y. L. (2019). An LSTM-based deep learning approach for classifying malicious traffic at the packet level. Applied Sciences (Switzerland), 9(16). https://doi.org/10.3390/app9163414.Google ScholarGoogle ScholarCross RefCross Ref
  7. Kang, M. J., & Kang, J. W. (2016). Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE, 11(6), 1--17. https://doi.org/10.1371/journal.pone.0155781Google ScholarGoogle ScholarCross RefCross Ref
  8. Kayacik, H. G., Zincir-Heywood, A. N., & Heywood, M. I. (2005). Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets. PST 2005 - 3rd Annual Conference on Privacy, Security and Trust, Conference Proceedings, 3--8.Google ScholarGoogle Scholar
  9. Kim, J., Kim, J., Kim, H., Shim, M., & Choi, E. (2020). CNN-based network intrusion detection against denial-of-service attacks. Electronics (Switzerland), 9(6), 1--21. https://doi.org/10.3390/electronics9060916.Google ScholarGoogle ScholarCross RefCross Ref
  10. Kolosnjaji, B., Zarras, A., Webster, G., & Eckert, C. (2016). Deep learning for classification of malware system call sequences. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9992 LNAI, 137--149. https://doi.org/10.1007/978-3-319-50127-7_11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kumar, R., & Kaur, T. (2014). Machine Learning based Traffic Classification using Low Level Features and Statistical Analysis. International Journal of Computer Applications, 108(12), 6--13. https://doi.org/10.5120/18961-0290Google ScholarGoogle ScholarCross RefCross Ref
  12. Liu, M. C. and J. (2016). Maxout neurons for deep convolutional and LSTM neural networks in speech recognition. Speech Communication, 77, 53--64. https://doi.org/DOI:https://doi.org/10.1016/j.specom.2015.12.003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., & Alsaadi, F. E. (2017). A survey of deep neural network architectures and their applications. Neurocomputing, 234, 11--26. https://doi.org/10.1016/j.neucom.2016.12.038.Google ScholarGoogle ScholarCross RefCross Ref
  14. Mathew, A., Amudha, P., & Sivakumari, S. (2021). Deep learning techniques: an overview. Advances in Intelligent Systems and Computing, 1141(August 2020), 599--608. https://doi.org/10.1007/978-981-15-3383-9_54.Google ScholarGoogle ScholarCross RefCross Ref
  15. McCulloch, W.S., Pitts, W. A. (1943). logical calculus of the ideas immanent in nervous activity. Bulletin of Mathematical Biophysics, 5, 115--133. https://doi.org/https://doi.org/10.1007/BF02478259.Google ScholarGoogle ScholarCross RefCross Ref
  16. Microsoft. (n.d.). Outlook for business Stay connected and organised wherever you work best.Google ScholarGoogle Scholar
  17. Nusrat, I., & Jang, S. B. (2018). A comparison of regularisation techniques in deep neural networks. Symmetry, 10(11), 1--17. https://doi.org/10.3390/sym10110648.Google ScholarGoogle ScholarCross RefCross Ref
  18. Pereyra, G., Zhang, Y., & Bengio, Y. (n.d.). Batch Normalized Recurrent Neural Networks. 1--9.Google ScholarGoogle Scholar
  19. Provos, N. (2003). Honeyd: A Virtual Honeypot Daemon. Proceedings of the 10th DFNCERT Workshop, January 2003, 1--7.Google ScholarGoogle Scholar
  20. Reddy, S. V. G., Thammi Reddy, K., & Valli Kumari, V. (2018). Optimisation of deep learning using various optimisers, loss functions and dropout. International Journal of Innovative Technology and Exploring Engineering, 8(2S), 272--279.Google ScholarGoogle Scholar
  21. Vu, L., Thuy, H. V., Nguyen, Q. U., Ngoc, T. N., Nguyen, D. N., Hoang, D. T., & Dutkiewicz, E. (2018). Time Series Analysis for Encrypted Traffic Classification: A Deep Learning Approach. ISCIT 2018 - 18th International Symposium on Communication and Information Technology, August 2019, 121--126. https://doi.org/10.1109/ISCIT.2018.8587975.Google ScholarGoogle ScholarCross RefCross Ref
  22. Yeo, M., Koo, Y., Yoon, Y., Hwang, T., Ryu, J., Song, J., & Park, C. (2018). Flow-based malware detection using convolutional neural network. International Conference on Information Networking, 2018-Janua, 910--913. https://doi.org/10.1109/ICOIN.2018.8343255.Google ScholarGoogle ScholarCross RefCross Ref
  23. Zhang, Y. & Guo, Q. & Wang, J. (2017). Big data analysis using neural networks. 49, 9--18. https://doi.org/10.15961/j.jsuese.2017.01.002.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Honeypot Behaviour Patterns Learning for Mass Email Marketing Detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      DSMLAI '21': Proceedings of the International Conference on Data Science, Machine Learning and Artificial Intelligence
      August 2021
      415 pages
      ISBN:9781450387637
      DOI:10.1145/3484824

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 January 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader