Please use this identifier to cite or link to this item:
https://hdl.handle.net/2440/128429
Citations | ||
Scopus | Web of Science® | Altmetric |
---|---|---|
?
|
?
|
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Millar, K.A. | - |
dc.contributor.author | Cheng, A. | - |
dc.contributor.author | Chew, H.G. | - |
dc.contributor.author | Lim, C.C. | - |
dc.contributor.editor | Ganji, M. | - |
dc.contributor.editor | Rashidi, L. | - |
dc.contributor.editor | Fung, B.C.M. | - |
dc.contributor.editor | Wang, C. | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Lecture Notes in Artificial Intelligence, 2018 / Ganji, M., Rashidi, L., Fung, B.C.M., Wang, C. (ed./s), vol.11154, pp.156-161 | - |
dc.identifier.isbn | 3030045021 | - |
dc.identifier.isbn | 9783030045029 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.issn | 1611-3349 | - |
dc.identifier.uri | http://hdl.handle.net/2440/128429 | - |
dc.description.abstract | As the sophistication of cyber malicious attacks increase, so too must the techniques used to detect and classify such malicious traffic in these networks. Deep learning has been deployed in many application domains as it is able to learn patterns from large feature sets. Given that the implementation of deep learning for network traffic classification is only just starting to emerge, the question of how best to utilise and represent network data to such a classifier still remains. This paper addresses this question by devising and evaluating three different ways of representing data to a deep neural network in the context of malicious traffic classification. We show that although deep learning does not show significant improvement over other machine learning techniques using metadata features, its use on payload data highlights the potential for deep learning to be incorporated into novel deep packet inspection techniques. Furthermore, we show that useful predictions of malicious classes can still be made when the input is limited to just the first 50 bytes of a packet’s payload. | - |
dc.description.statementofresponsibility | K. Millar, A. Cheng, H. G. Chew, and C.-C. Lim | - |
dc.language.iso | en | - |
dc.publisher | Springer | - |
dc.relation.ispartofseries | Lecture Notes in Computer Science; 11154 | - |
dc.rights | © Springer Nature Switzerland AG 2018 | - |
dc.source.uri | https://link.springer.com/book/10.1007/978-3-030-04503-6 | - |
dc.subject | Deep learning; Convolutional neural networks; Internet traffic classification; Malicious traffic detection | - |
dc.title | Deep learning for classifying malicious network traffic | - |
dc.type | Conference paper | - |
dc.contributor.conference | 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) (3 Jun 2018 - 6 Jun 2018 : Melbourne, Australia) | - |
dc.identifier.doi | 10.1007/978-3-030-04503-6_15 | - |
dc.publisher.place | Switzerland | - |
pubs.publication-status | Published | - |
dc.identifier.orcid | Millar, K.A. [0000-0002-9410-3654] | - |
dc.identifier.orcid | Chew, H.G. [0000-0001-6525-574X] | - |
dc.identifier.orcid | Lim, C.C. [0000-0002-2463-9760] | - |
Appears in Collections: | Aurora harvest 8 Electrical and Electronic Engineering publications |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.