2020
DOI: 10.1109/access.2020.3035967
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection

Abstract: As an essential part of the network-based intrusion detection systems (IDS), malicious traffic detection using deep learning methods has become a research focus in network intrusion detection. However, even the most advanced IDS available are challenging to satisfy real-time detection because they usually need to accumulate the packets into particular flows and then extract the features, causing processing delays. In this paper, using the deep learning approach, we propose a deep hierarchical network for malic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(9 citation statements)
references
References 33 publications
0
9
0
Order By: Relevance
“…Their model provided better outcomes for the normal class, but the anomaly class outcome was not satisfactory. Wang et al [21] build a deep hierarchical network for packet-level analysis of malicious traffic capable of understanding traffic characteristics from raw packet data. They extracted spatial features from the raw packet using a CNN and temporal features using GRU (Gated Recurrent Units).…”
Section: Related Workmentioning
confidence: 99%
“…Their model provided better outcomes for the normal class, but the anomaly class outcome was not satisfactory. Wang et al [21] build a deep hierarchical network for packet-level analysis of malicious traffic capable of understanding traffic characteristics from raw packet data. They extracted spatial features from the raw packet using a CNN and temporal features using GRU (Gated Recurrent Units).…”
Section: Related Workmentioning
confidence: 99%
“…However, these experiments are only performed on self-generated data that contains limited network attack types. Similarly, the authors in [26] developed a deep hierarchical model to detect abnormal network traffic at the packet level. The model is based on a mix of CNN and Gated Recurrent Units (GRU); it is evaluated on three data sets: ISCX2012, USTC-TFC2016, and CICIDS2017, and achieves 99% accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…Most IDS need packets to be gathered into certain flows and then analyzed, incurring processing delays, even the most sophisticated ones. In order to identify malicious traffic at the packet level, Wang et al [15] offer a deep learning strategy, employing hierarchical networks, which can learn the properties of communication using basic data packets. They also explored how data balance affects classification performance and time efficiency between the LSTM and GRU models.…”
Section: Related Workmentioning
confidence: 99%