2021
DOI: 10.1049/ell2.12125
|View full text |Cite
|
Sign up to set email alerts
|

A deep‐learning‐ and reinforcement‐learning‐based system for encrypted network malicious traffic detection

Abstract: Traditional network intrusion detection methods lack the ability of automatic feature extraction for encrypted network malicious traffic, and thus, the detection rates are low. Moreover, the means of this malicious traffic are concealed, and the key malicious features are usually hidden in many normal data packets, so fewer encrypted malicious traffic samples can be captured. This easily leads to insufficient system training, low detection rate, and high false alarm rate. This letter proposes an encrypted netw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…In particular, network traffic is typical time series data, so preprocessing is essential. Length normalization is generally essential in machine learning and deep learning, where models require input of the same length in [12,21,24,30,54] the data length was normalized to 784 bytes for the purpose of transforming one-dimensional data into two-dimensional data, and [26,34,50] generated the same length of input data for network traffic data through normalization to a user-specified length and used it for anomaly detection experiments.…”
Section: Preprocessingmentioning
confidence: 99%
“…In particular, network traffic is typical time series data, so preprocessing is essential. Length normalization is generally essential in machine learning and deep learning, where models require input of the same length in [12,21,24,30,54] the data length was normalized to 784 bytes for the purpose of transforming one-dimensional data into two-dimensional data, and [26,34,50] generated the same length of input data for network traffic data through normalization to a user-specified length and used it for anomaly detection experiments.…”
Section: Preprocessingmentioning
confidence: 99%
“…By extracting frequency domain features for training the deep learning model, the detection accuracy was improved, the scale of features was limited, and faster detection speed was realized. Many other studies [11] [12] [13] have also carried out performance optimization based on various deep learning models, but most of these works are based on supervised learning, which requires a large amount of data with accurate labels, which needs lots of human effort in a practical production environment.…”
Section: Pos(isgc2022)030mentioning
confidence: 99%
“…In their proposed framework, a method called a "deep-full-range" (DFR) process is applied, based on three deep learning models, namely, the CNN, LSTM, and sparse autoencoder models. In 2021, Yang et al [19] proposed a malicious traffic detection model for encrypted networks that is based on ResNet. They deleted irrelevant data information from data packets, as well as any duplicate or empty data packets.…”
Section: Current Research On Malicious Encrypted Traffic Detectionmentioning
confidence: 99%