2019
DOI: 10.48550/arxiv.1912.02549
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Deep Anomaly Detection in Packet Payload

Abstract: With the widespread adoption of cloud services, especially the extensive deployment of plenty of Web applications, it is important and challenging to detect anomalies from the packet payload. For example, the anomalies in the packet payload can be expressed as a number of specific strings which may cause attacks. Although some approaches have achieved remarkable progress, they are with limited applications since they are dependent on indepth expert knowledge, e.g., signatures describing anomalies or communicat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 28 publications
(30 reference statements)
0
4
1
Order By: Relevance
“…We decided to use a linear kernel, which means that the samples are well-separated in higher dimension. In comparison with results we considered ideal, we obtained FPR99 = 4.2%, which is much worse than those reported by [6]. We believe, that this is mainly due to a different usage of the data.…”
Section: Cse-cic-ids2018contrasting
confidence: 79%
See 3 more Smart Citations
“…We decided to use a linear kernel, which means that the samples are well-separated in higher dimension. In comparison with results we considered ideal, we obtained FPR99 = 4.2%, which is much worse than those reported by [6]. We believe, that this is mainly due to a different usage of the data.…”
Section: Cse-cic-ids2018contrasting
confidence: 79%
“…The next work we found presents a fully supervised approach [6]. An LSTM-CNN neural architecture is used to classify HTTP traffic.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Liu et al [106] used a hybrid model of LSTM and CNN to capture the long-term and short-term dependencies in the network traffic sequence. First, they built an LSTM model on the network traffic to capture long-term dependencies.…”
Section: Rnn + Cnnmentioning
confidence: 99%