Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/128429
Citations
Scopus Web of Science® Altmetric
?
?
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMillar, K.A.-
dc.contributor.authorCheng, A.-
dc.contributor.authorChew, H.G.-
dc.contributor.authorLim, C.C.-
dc.contributor.editorGanji, M.-
dc.contributor.editorRashidi, L.-
dc.contributor.editorFung, B.C.M.-
dc.contributor.editorWang, C.-
dc.date.issued2018-
dc.identifier.citationLecture Notes in Artificial Intelligence, 2018 / Ganji, M., Rashidi, L., Fung, B.C.M., Wang, C. (ed./s), vol.11154, pp.156-161-
dc.identifier.isbn3030045021-
dc.identifier.isbn9783030045029-
dc.identifier.issn0302-9743-
dc.identifier.issn1611-3349-
dc.identifier.urihttp://hdl.handle.net/2440/128429-
dc.description.abstractAs the sophistication of cyber malicious attacks increase, so too must the techniques used to detect and classify such malicious traffic in these networks. Deep learning has been deployed in many application domains as it is able to learn patterns from large feature sets. Given that the implementation of deep learning for network traffic classification is only just starting to emerge, the question of how best to utilise and represent network data to such a classifier still remains. This paper addresses this question by devising and evaluating three different ways of representing data to a deep neural network in the context of malicious traffic classification. We show that although deep learning does not show significant improvement over other machine learning techniques using metadata features, its use on payload data highlights the potential for deep learning to be incorporated into novel deep packet inspection techniques. Furthermore, we show that useful predictions of malicious classes can still be made when the input is limited to just the first 50 bytes of a packet’s payload.-
dc.description.statementofresponsibilityK. Millar, A. Cheng, H. G. Chew, and C.-C. Lim-
dc.language.isoen-
dc.publisherSpringer-
dc.relation.ispartofseriesLecture Notes in Computer Science; 11154-
dc.rights© Springer Nature Switzerland AG 2018-
dc.source.urihttps://link.springer.com/book/10.1007/978-3-030-04503-6-
dc.subjectDeep learning; Convolutional neural networks; Internet traffic classification; Malicious traffic detection-
dc.titleDeep learning for classifying malicious network traffic-
dc.typeConference paper-
dc.contributor.conference22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) (3 Jun 2018 - 6 Jun 2018 : Melbourne, Australia)-
dc.identifier.doi10.1007/978-3-030-04503-6_15-
dc.publisher.placeSwitzerland-
pubs.publication-statusPublished-
dc.identifier.orcidMillar, K.A. [0000-0002-9410-3654]-
dc.identifier.orcidChew, H.G. [0000-0001-6525-574X]-
dc.identifier.orcidLim, C.C. [0000-0002-2463-9760]-
Appears in Collections:Aurora harvest 8
Electrical and Electronic Engineering publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.