skip to main content
10.1145/3605801.3605844acmotherconferencesArticle/Chapter ViewAbstractPublication PagescncitConference Proceedingsconference-collections
research-article

Network Traffic Analysis Method Using the Fusion of Dynamic-Static Features based on Stacked Attention Mechanism

Published:09 August 2023Publication History

ABSTRACT

Network traffic analysis is a widely-adopted data fusion technology in network management and security, encompassing tasks such as malicious traffic detection and intrusion detection. With the proliferation of network users and emergence of new network services, network traffic analysis has garnered increasing attention. Current research methods primarily include machine learning analysis based on manual feature construction and neural networks for automatic feature extraction. However, manually designing features can be cumbersome and susceptible to errors, while shallow neural networks may not effectively learn feature relationships. The deep neural networks involve significant computational resources and may be susceptible to over-fitting. Moreover, both methods rely solely on a single feature source. To address these issues, this paper proposes a Dynamic-Static features fusion model based on stacked attention mechanism for network traffic analysis(DS-SAT). Next, we evaluated this method in five publicly available datasets and the experimental results show that our proposed method has achieved better results than other research methods.

References

  1. Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and Selcuk Uluagac. 2020. Peek-a-boo: I see your smart home activities, even encrypted!. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 207–218.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Blake Anderson and David McGrew. 2017. Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity. In Proceedings of the 23rd ACM SIGKDD International Conference on knowledge discovery and data mining. 1723–1732.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Monica Arul and Ahsan Kareem. 2021. Applications of shapelet transform to time series classification of earthquake, wind and wave data. Engineering Structures 228 (2021), 111564.Google ScholarGoogle ScholarCross RefCross Ref
  4. Frank Beer, Tim Hofer, David Karimi, and Ulrich Bühler. 2017. A new attack composition for network security. In 10. DFN-Forum Kommunikationstechnologien. Gesellschaft für Informatik eV.Google ScholarGoogle Scholar
  5. Elaheh Biglar Beigi, Hossein Hadian Jazi, Natalia Stakhanova, and Ali A Ghorbani. 2014. Towards effective feature selection in machine learning-based botnet detection approaches. In 2014 IEEE Conference on Communications and Network Security. IEEE, 247–255.Google ScholarGoogle ScholarCross RefCross Ref
  6. Mauro Conti, Luigi Vincenzo Mancini, Riccardo Spolaor, and Nino Vincenzo Verde. 2015. Analyzing android encrypted network traffic to identify user actions. IEEE Transactions on Information Forensics and Security 11, 1 (2015), 114–125.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Alberto Dainotti, Antonio Pescape, and Kimberly C Claffy. 2012. Issues and future directions in traffic classification. IEEE network 26, 1 (2012), 35–40.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Liangdong Deng, Yuzhou Feng, Dong Chen, and Naphtali Rishe. 2019. Iotspot: Identifying the iot devices using their anonymous network traffic data. In MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM). IEEE, 1–6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Sebastian Garcia, Martin Grill, Jan Stiborek, and Alejandro Zunino. 2014. An empirical comparison of botnet detection methods. computers & security 45 (2014), 100–123.Google ScholarGoogle Scholar
  10. Eric L Goodman, Chase Zimmerman, and Corey Hudson. 2020. Packet2vec: Utilizing word2vec for feature extraction in packet data. arXiv preprint arXiv:2004.14477 (2020).Google ScholarGoogle Scholar
  11. Mehedi Hassan, Md Enamul Haque, Mehmet Engin Tozal, Vijay Raghavan, and Rajeev Agrawal. 2021. Intrusion detection using payload embeddings. IEEE Access 10 (2021), 4015–4030.Google ScholarGoogle ScholarCross RefCross Ref
  12. Sepp Hochreiter. 1998. The vanishing gradient problem during learning recurrent neural nets and problem solutions. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 6, 02 (1998), 107–116.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jordan Holland, Paul Schmitt, Nick Feamster, and Prateek Mittal. 2021. New directions in automated traffic analysis. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 3366–3383.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kahraman Kostas, Mike Just, and Michael A Lones. 2022. IoTDevID: A behavior-based device identification method for the IoT. IEEE Internet of Things Journal 9, 23 (2022), 23741–23749.Google ScholarGoogle ScholarCross RefCross Ref
  15. LECUN. 2015. Y, BENGIO Y, HINTON G. Deep learning. Nature 521, 7553 (2015), 436–444.Google ScholarGoogle Scholar
  16. Hongyu Liu, Bo Lang, Ming Liu, and Hanbing Yan. 2019. CNN and RNN based payload classification methods for attack detection. Knowledge-Based Systems 163 (2019), 332–341.Google ScholarGoogle ScholarCross RefCross Ref
  17. Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N Asokan, Ahmad-Reza Sadeghi, and Sasu Tarkoma. 2017. Iot sentinel: Automated device-type identification for security enforcement in iot. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2177–2184.Google ScholarGoogle Scholar
  18. Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013).Google ScholarGoogle Scholar
  19. Andrew W Moore and Denis Zuev. 2005. Internet traffic classification using bayesian analysis techniques. In Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. 50–60.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Baskoro Adi Pratomo, Pete Burnap, and George Theodorakopoulos. 2018. Unsupervised approach for detecting low rate attacks on network traffic with autoencoder. In 2018 international conference on cyber security and protection of digital services (Cyber Security). IEEE, 1–8.Google ScholarGoogle ScholarCross RefCross Ref
  21. Markus Ring, Sarah Wunderlich, Deniz Scheuring, Dieter Landes, and Andreas Hotho. 2019. A survey of network-based intrusion detection data sets. Computers & Security 86 (2019), 147–167.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Pavel Senin and Sergey Malinchik. 2013. Sax-vsm: Interpretable time series classification using sax and vector space model. In 2013 IEEE 13th international conference on data mining. IEEE, 1175–1180.Google ScholarGoogle ScholarCross RefCross Ref
  23. Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, and Ali A Ghorbani. 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. computers & security 31, 3 (2012), 357–374.Google ScholarGoogle Scholar
  24. Vishwanath A Sindagi and Vishal M Patel. 2018. A survey of recent advances in cnn-based single image crowd counting and density estimation. Pattern Recognition Letters 107 (2018), 3–16.Google ScholarGoogle ScholarCross RefCross Ref
  25. Dalwinder Singh and Birmohan Singh. 2020. Investigating the impact of data normalization on classification performance. Applied Soft Computing 97 (2020), 105524.Google ScholarGoogle ScholarCross RefCross Ref
  26. Arunan Sivanathan, Hassan Habibi Gharakheili, Franco Loi, Adam Radford, Chamith Wijenayake, Arun Vishwanath, and Vijay Sivaraman. 2018. Classifying IoT devices in smart environments using network traffic characteristics. IEEE Transactions on Mobile Computing 18, 8 (2018), 1745–1759.Google ScholarGoogle ScholarCross RefCross Ref
  27. Wei Wang, Yiqiang Sheng, Jinlin Wang, Xuewen Zeng, Xiaozhou Ye, Yongzhong Huang, and Ming Zhu. 2017. HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE access 6 (2017), 1792–1806.Google ScholarGoogle Scholar

Index Terms

  1. Network Traffic Analysis Method Using the Fusion of Dynamic-Static Features based on Stacked Attention Mechanism

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CNCIT '23: Proceedings of the 2023 2nd International Conference on Networks, Communications and Information Technology
      June 2023
      253 pages
      ISBN:9798400700620
      DOI:10.1145/3605801

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 August 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)30
      • Downloads (Last 6 weeks)5

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format