• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

利用数据包捕获文件和业务特征数据融合进行恶意网络行为检测。

Malicious Network Behavior Detection Using Fusion of Packet Captures Files and Business Feature Data.

机构信息

School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China.

School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China.

出版信息

Sensors (Basel). 2021 Sep 3;21(17):5942. doi: 10.3390/s21175942.

DOI:10.3390/s21175942
PMID:34502833
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8434644/
Abstract

Information and communication technologies have essential impacts on people's life. The real time convenience of the internet greatly facilitates the information transmission and knowledge exchange of users. However, network intruders utilize some communication holes to complete malicious attacks. Some traditional machine learning (ML) methods based on business features and deep learning (DL) methods extracting features automatically are used to identify these malicious behaviors. However, these approaches tend to use only one type of data source, which can result in the loss of some features that can not be mined in the data. In order to address this problem and to improve the precision of malicious behavior detection, this paper proposed a one-dimensional (1D) convolution-based fusion model of packet capture files and business feature data for malicious network behavior detection. Fusion models improve the malicious behavior detection results compared with single ones in some available network traffic and Internet of things (IOT) datasets. The experiments also indicate that early data fusion, feature fusion and decision fusion are all effective in the model. Moreover, this paper also discusses the adaptability of one-dimensional convolution and two-dimensional (2D) convolution to network traffic data.

摘要

信息技术对人们的生活有着重要的影响。互联网的实时便利性极大地促进了用户的信息传输和知识交流。然而,网络入侵者利用一些通信漏洞来完成恶意攻击。一些基于业务特征的传统机器学习 (ML) 方法和自动提取特征的深度学习 (DL) 方法被用于识别这些恶意行为。然而,这些方法往往只使用一种类型的数据源,这可能导致一些无法从数据中挖掘出来的特征丢失。为了解决这个问题,提高恶意行为检测的准确性,本文提出了一种基于一维 (1D) 卷积的数据包捕获文件和业务特征数据融合模型,用于恶意网络行为检测。融合模型在一些可用的网络流量和物联网 (IOT) 数据集上提高了恶意行为检测的结果,与单一模型相比。实验还表明,在模型中早期的数据融合、特征融合和决策融合都是有效的。此外,本文还讨论了一维卷积和二维 (2D) 卷积对网络流量数据的适应性。

相似文献

1
Malicious Network Behavior Detection Using Fusion of Packet Captures Files and Business Feature Data.利用数据包捕获文件和业务特征数据融合进行恶意网络行为检测。
Sensors (Basel). 2021 Sep 3;21(17):5942. doi: 10.3390/s21175942.
2
A Malicious Code Detection Method Based on FF-MICNN in the Internet of Things.基于 FF-MICNN 的物联网恶意代码检测方法。
Sensors (Basel). 2022 Nov 12;22(22):8739. doi: 10.3390/s22228739.
3
TSFN: A Novel Malicious Traffic Classification Method Using BERT and LSTM.TSFN:一种使用BERT和LSTM的新型恶意流量分类方法
Entropy (Basel). 2023 May 19;25(5):821. doi: 10.3390/e25050821.
4
Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.迈向基于深度学习驱动的物联网入侵检测
Sensors (Basel). 2019 Apr 27;19(9):1977. doi: 10.3390/s19091977.
5
An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.基于聚合互信息的特征选择与机器学习方法在增强物联网僵尸网络攻击检测中的应用。
Sensors (Basel). 2021 Dec 28;22(1):185. doi: 10.3390/s22010185.
6
An Improved LDA-Based ELM Classification for Intrusion Detection Algorithm in IoT Application.基于改进 LDA 的 ELM 分类算法在物联网应用中的入侵检测。
Sensors (Basel). 2020 Mar 19;20(6):1706. doi: 10.3390/s20061706.
7
Enhancing the security of patients' portals and websites by detecting malicious web crawlers using machine learning techniques.利用机器学习技术检测恶意网络爬虫,增强患者门户和网站的安全性。
Int J Med Inform. 2019 Dec;132:103976. doi: 10.1016/j.ijmedinf.2019.103976. Epub 2019 Sep 25.
8
Examining the Suitability of NetFlow Features in Detecting IoT Network Intrusions.检测 NetFlow 特征在检测物联网网络入侵中的适用性。
Sensors (Basel). 2022 Aug 17;22(16):6164. doi: 10.3390/s22166164.
9
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.HDL-IDS:一种用于车联网入侵检测的混合深度学习架构。
Sensors (Basel). 2022 Feb 10;22(4):1340. doi: 10.3390/s22041340.
10
An ensemble classification method based on machine learning models for malicious Uniform Resource Locators (URL).基于机器学习模型的恶意统一资源定位器 (URL) 集成分类方法。
PLoS One. 2024 May 31;19(5):e0302196. doi: 10.1371/journal.pone.0302196. eCollection 2024.

本文引用的文献

1
Feature-Selection and Mutual-Clustering Approaches to Improve DoS Detection and Maintain WSNs' Lifetime.基于特征选择和互聚类的方法提高拒绝服务攻击检测能力并延长 WSNs 的生命周期。
Sensors (Basel). 2021 Jul 15;21(14):4821. doi: 10.3390/s21144821.
2
The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection Dataset.RoEduNet-SIMARGL2021 网络入侵检测数据集的提出与评估。
Sensors (Basel). 2021 Jun 24;21(13):4319. doi: 10.3390/s21134319.
3
C-MHAD: Continuous Multimodal Human Action Dataset of Simultaneous Video and Inertial Sensing.
C-MHAD:同时视频和惯性感知的连续多模态人体动作数据集。
Sensors (Basel). 2020 May 20;20(10):2905. doi: 10.3390/s20102905.
4
A Software Deep Packet Inspection System for Network Traffic Analysis and Anomaly Detection.软件深度包检测系统在网络流量分析和异常检测中的应用。
Sensors (Basel). 2020 Mar 14;20(6):1637. doi: 10.3390/s20061637.
5
Fusion of Video and Inertial Sensing for Deep Learning-Based Human Action Recognition.视频与惯性传感器融合的深度学习人体动作识别
Sensors (Basel). 2019 Aug 24;19(17):3680. doi: 10.3390/s19173680.
6
Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network.使用改进的条件变分自编码器和深度神经网络提高入侵检测的分类有效性
Sensors (Basel). 2019 Jun 2;19(11):2528. doi: 10.3390/s19112528.