Abstract
Information and communication technologies have essential impacts on people’s life. The real time convenience of the internet greatly facilitates the information transmission and knowledge exchange of users. However, network intruders utilize some communication holes to complete malicious attacks. Some traditional machine learning (ML) methods based on business features and deep learning (DL) methods extracting features automatically are used to identify these malicious behaviors. However, these approaches tend to use only one type of data source, which can result in the loss of some features that can not be mined in the data. In order to address this problem and to improve the precision of malicious behavior detection, this paper proposed a one-dimensional (1D) convolution-based fusion model of packet capture files and business feature data for malicious network behavior detection. Fusion models improve the malicious behavior detection results compared with single ones in some available network traffic and Internet of things (IOT) datasets. The experiments also indicate that early data fusion, feature fusion and decision fusion are all effective in the model. Moreover, this paper also discusses the adaptability of one-dimensional convolution and two-dimensional (2D) convolution to network traffic data.
Highlights
Cyber security plays an indispensable role in people’s life
The key contributions of the presented work are the following: (1) We proposed a Convolutional Neural Network(CNN)-based fusion model of packet capture (PCAP) files and business feature data for malicious network behavior detection, and experiments results show that the fusion model can improve the detection precision with little increase in time and resource consumption
(2) Three fusion approaches, early data fusion, feature fusion and decision fusion, are discussed here, and we find that each method can extract more discriminating and complementary features
Summary
Cyber security plays an indispensable role in people’s life. Malicious network behaviors will affect account security, software security, payment security, communication security and so on in daily life [1]. Some application systems and frameworks for enhancing information security have been covered by many researchers [3,4,5]. Some researchers have tried discovering more features in each network application behavior and tried identifying the malicious ones. By assuming that there are different types of data samples which can represent network behaviors in different forms, we can collect dissimilar information from each one. If this information can be combined to build detection models, the identification results may achieve better performance. Fusion models of packet captures files and business feature data are used to achieve better malicious network behavior detection results
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have