2022
DOI: 10.1016/j.neucom.2021.01.146
|View full text |Cite
|
Sign up to set email alerts
|

Deep anomaly detection in packet payload

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 21 publications
0
15
0
Order By: Relevance
“…This approach could improve the performance of existing models based on classical machine learning, while reducing the effort of labeling training data. Liu et al [14] designed a specially designed neural network that includes long short-term memory, convolutional neural networks and multi-head self attention mechanism to detect packet payload anomalies. It could learn the potential dependency relationships among the packet payload in both perspectives, i.e., a global perspective as well as a perspective from local features to aggregative representation.…”
Section: Related Work a Deep Supervised Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach could improve the performance of existing models based on classical machine learning, while reducing the effort of labeling training data. Liu et al [14] designed a specially designed neural network that includes long short-term memory, convolutional neural networks and multi-head self attention mechanism to detect packet payload anomalies. It could learn the potential dependency relationships among the packet payload in both perspectives, i.e., a global perspective as well as a perspective from local features to aggregative representation.…”
Section: Related Work a Deep Supervised Anomaly Detectionmentioning
confidence: 99%
“…Depending on whether the anomaly samples are available at the training stage, the existing anomaly detection approaches can be categorized into three groups, i.e., supervised learning methods [1], [13], [14], unsupervised learning methods [2], [7], [15], [16], [17], [18] and weakly-supervised learning methods [19], [20], [21]. The supervised methods leverage both normal and abnormal data to train a detector.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, no information is given regarding the extraction and labeling of raw packet files. Similarly, [6] also utilizes the CIC-IDS2017 dataset. In this approach, the author employs the payload data to construct a block sequence that contains two kinds of information that retain short-term and long-term dependency relationships among the malicious byte in payload data.…”
Section: B Approaches Based On Modern Datamentioning
confidence: 99%
“…NIDS utilizes various approaches for the detection of malicious attack instances. The most prominent of these approaches are rulebased, flow-based, and packet-based methods [6]. Rule-based methods are typically based on feature selection to construct domain-specific rules.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation