ABSTRACT
The use of deep learning in detecting network attacks is widely adopted. However, supervised learning requires labeled training data to learn behaviour of honeypot in honeynet. This research studies the problem of learning patterns from honeypot behaviour to validate mass email marketing. Honeypots are deceiving, and their behaviour are the sources of security data for cyber-security research. Deep learning models are explored to learn behaviour from labeled time series of sequences of security events collected from production virtual Local Area Network. Evaluation on deception demonstrates detection of mass email marketing using Multilayer Perceptron Neural Networks with an accuracy of 87%.
- Alaidaros, H., & Mahmuddin, M. (2017). Flow-Based Approach on Bro Intrusion Detection. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-2), 139--145. Retrieved from https://jtec.utem.edu.my/jtec/article/view/2234Google Scholar
- Albahar, M. A. (2019). Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments. 2019(D1).Google Scholar
- Fedynyshyn, G., Chuah, M. C., & Tan, G. (2014). Detection and Classification of Different Botnet C & C Channels Detection and Classification of Different Botnet C & C Channels. May. https://doi.org/10.1007/978-3-642-23496-5Google ScholarCross Ref
- Gavrilov, A. D., Jordache, A., Vasdani, M., & Deng, J. (2019). Preventing Model Overfitting and Underfitting in Convolutional Neural Networks. International Journal of Software Science and Computational Intelligence, 10(4), 19--28. https://doi.org/10.4018/ijssci.2018100102.Google ScholarCross Ref
- Hinton, N. S. G., Sutskever, A. K. I., & Salakhutdinov, R. (2014). Dropout: A Simple Way to Prevent Neural Networks from Overfitting. Journal of Machine Learning Research, 56(15), 1929--1958. https://doi.org/10.1016/0370-2693(93)90272-J.Google ScholarCross Ref
- Hwang, R. H., Peng, M. C., Nguyen, V. L., & Chang, Y. L. (2019). An LSTM-based deep learning approach for classifying malicious traffic at the packet level. Applied Sciences (Switzerland), 9(16). https://doi.org/10.3390/app9163414.Google ScholarCross Ref
- Kang, M. J., & Kang, J. W. (2016). Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE, 11(6), 1--17. https://doi.org/10.1371/journal.pone.0155781Google ScholarCross Ref
- Kayacik, H. G., Zincir-Heywood, A. N., & Heywood, M. I. (2005). Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets. PST 2005 - 3rd Annual Conference on Privacy, Security and Trust, Conference Proceedings, 3--8.Google Scholar
- Kim, J., Kim, J., Kim, H., Shim, M., & Choi, E. (2020). CNN-based network intrusion detection against denial-of-service attacks. Electronics (Switzerland), 9(6), 1--21. https://doi.org/10.3390/electronics9060916.Google ScholarCross Ref
- Kolosnjaji, B., Zarras, A., Webster, G., & Eckert, C. (2016). Deep learning for classification of malware system call sequences. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9992 LNAI, 137--149. https://doi.org/10.1007/978-3-319-50127-7_11.Google ScholarDigital Library
- Kumar, R., & Kaur, T. (2014). Machine Learning based Traffic Classification using Low Level Features and Statistical Analysis. International Journal of Computer Applications, 108(12), 6--13. https://doi.org/10.5120/18961-0290Google ScholarCross Ref
- Liu, M. C. and J. (2016). Maxout neurons for deep convolutional and LSTM neural networks in speech recognition. Speech Communication, 77, 53--64. https://doi.org/DOI:https://doi.org/10.1016/j.specom.2015.12.003.Google ScholarDigital Library
- Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., & Alsaadi, F. E. (2017). A survey of deep neural network architectures and their applications. Neurocomputing, 234, 11--26. https://doi.org/10.1016/j.neucom.2016.12.038.Google ScholarCross Ref
- Mathew, A., Amudha, P., & Sivakumari, S. (2021). Deep learning techniques: an overview. Advances in Intelligent Systems and Computing, 1141(August 2020), 599--608. https://doi.org/10.1007/978-981-15-3383-9_54.Google ScholarCross Ref
- McCulloch, W.S., Pitts, W. A. (1943). logical calculus of the ideas immanent in nervous activity. Bulletin of Mathematical Biophysics, 5, 115--133. https://doi.org/https://doi.org/10.1007/BF02478259.Google ScholarCross Ref
- Microsoft. (n.d.). Outlook for business Stay connected and organised wherever you work best.Google Scholar
- Nusrat, I., & Jang, S. B. (2018). A comparison of regularisation techniques in deep neural networks. Symmetry, 10(11), 1--17. https://doi.org/10.3390/sym10110648.Google ScholarCross Ref
- Pereyra, G., Zhang, Y., & Bengio, Y. (n.d.). Batch Normalized Recurrent Neural Networks. 1--9.Google Scholar
- Provos, N. (2003). Honeyd: A Virtual Honeypot Daemon. Proceedings of the 10th DFNCERT Workshop, January 2003, 1--7.Google Scholar
- Reddy, S. V. G., Thammi Reddy, K., & Valli Kumari, V. (2018). Optimisation of deep learning using various optimisers, loss functions and dropout. International Journal of Innovative Technology and Exploring Engineering, 8(2S), 272--279.Google Scholar
- Vu, L., Thuy, H. V., Nguyen, Q. U., Ngoc, T. N., Nguyen, D. N., Hoang, D. T., & Dutkiewicz, E. (2018). Time Series Analysis for Encrypted Traffic Classification: A Deep Learning Approach. ISCIT 2018 - 18th International Symposium on Communication and Information Technology, August 2019, 121--126. https://doi.org/10.1109/ISCIT.2018.8587975.Google ScholarCross Ref
- Yeo, M., Koo, Y., Yoon, Y., Hwang, T., Ryu, J., Song, J., & Park, C. (2018). Flow-based malware detection using convolutional neural network. International Conference on Information Networking, 2018-Janua, 910--913. https://doi.org/10.1109/ICOIN.2018.8343255.Google ScholarCross Ref
- Zhang, Y. & Guo, Q. & Wang, J. (2017). Big data analysis using neural networks. 49, 9--18. https://doi.org/10.15961/j.jsuese.2017.01.002.Google ScholarCross Ref
Index Terms
- Honeypot Behaviour Patterns Learning for Mass Email Marketing Detection
Recommendations
Honeypot detection in advanced botnet attacks
Botnets have become one of the major attacks in the internet today due to their illicit profitable financial gain. Meanwhile, honeypots have been successfully deployed in many computer security defence systems. Since honeypots set up by security ...
A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges
AbstractThere has been an increasing trend of malware release, which raises the alarm for security professionals worldwide. It is often challenging to stay on top of different types of malware and their detection techniques, which are ...
Highlights- Malicious software behaviour analysis.
- Machine learning and deep learning ...
A comprehensive survey on deep learning based malware detection techniques
AbstractRecent theoretical and practical studies have revealed that malware is one of the most harmful threats to the digital world. Malware mitigation techniques have evolved over the years to ensure security. Earlier, several classical ...
Comments