Abstract
In recent years, with the rapid development of Internet services in all walks of life, a large number of malicious acts such as network attacks, data leakage, and information theft have become major challenges for network security. Due to the difficulty of malicious traffic collection and labeling, the distribution of various samples in the existing dataset is seriously imbalanced, resulting in low accuracy of malicious traffic classification based on machine learning and deep learning, and poor model generalization ability. In this paper, a feature image representation method and Adversarial Generative Network with Filter (Filter-GAN) are proposed to solve these problems. First, the feature image representation method divides the original session traffic into three parts. The Markov matrix is extracted from each part to form a three-channel feature image. This method can transform the original session traffic format into a uniform-length matrix and fully characterize the network traffic. Then, Filter-GAN uses the feature images to generate few attack samples. Compared with general methods, Filter-GAN can generate more efficient samples. Experiments were conducted on public datasets. The results show that the feature image representation method can effectively characterize the original session traffic. When the number of samples is sufficient, the classification accuracy can reach 99%. Compared with unbalanced datasets, Filter-GAN has significantly improved the recognition accuracy of small-sample datasets, with a maximum improvement of 6%.
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference34 articles.
1. Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registryhttps://www.rfc-editor.org/info/rfc6335
2. A multilevel taxonomy and requirements for an optimal traffic-classification model
3. Towards automated application signature generation for traffic identification;Park;Proceedings of the NOMS 2008—2008 IEEE Network Operations and Management Symposium,2008
4. Blindbox: Deep packet inspection over encrypted traffic;Sherry;Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication,2015
5. Training effective deep reinforcement learning agents for real-time life-cycle production optimization
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献