Detection of Malicious Network Flows with Low Preprocessing Overhead

Fox, Garett and Boppana, Rajendra V. (2022) Detection of Malicious Network Flows with Low Preprocessing Overhead. Network, 2 (4). pp. 628-642. ISSN 2673-8732

[thumbnail of network-02-00036-v2.pdf] Text
network-02-00036-v2.pdf - Published Version

Download (1MB)

Abstract

Machine learning (ML) is frequently used to identify malicious traffic flows on a network. However, the requirement of complex preprocessing of network data to extract features or attributes of interest before applying the ML models restricts their use to offline analysis of previously captured network traffic to identify attacks that have already occurred. This paper applies machine learning analysis for network security with low preprocessing overhead. Raw network data are converted directly into bitmap files and processed through a Two-Dimensional Convolutional Neural Network (2D-CNN) model to identify malicious traffic. The model has high accuracy in detecting various malicious traffic flows, even zero-day attacks, based on testing with three open-source network traffic datasets. The overhead of preprocessing the network data before applying the 2D-CNN model is very low, making it suitable for on-the-fly network traffic analysis for malicious traffic flows.

Item Type: Article
Subjects: ScienceOpen Library > Computer Science
Depositing User: Managing Editor
Date Deposited: 12 Jun 2023 04:33
Last Modified: 23 Oct 2024 03:51
URI: http://scholar.researcherseuropeans.com/id/eprint/1509

Actions (login required)

View Item
View Item