Detection of Malicious Network Flows with Low Preprocessing Overhead

Date

2022-11-04

Authors

Fox, Garett
Boppana, Rajendra V.

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

Machine learning (ML) is frequently used to identify malicious traffic flows on a network. However, the requirement of complex preprocessing of network data to extract features or attributes of interest before applying the ML models restricts their use to offline analysis of previously captured network traffic to identify attacks that have already occurred. This paper applies machine learning analysis for network security with low preprocessing overhead. Raw network data are converted directly into bitmap files and processed through a Two-Dimensional Convolutional Neural Network (2D-CNN) model to identify malicious traffic. The model has high accuracy in detecting various malicious traffic flows, even zero-day attacks, based on testing with three open-source network traffic datasets. The overhead of preprocessing the network data before applying the 2D-CNN model is very low, making it suitable for on-the-fly network traffic analysis for malicious traffic flows.

Description

Keywords

network security, deep learning, machine learning, convolutional neural networks, raw packet analysis

Citation

Network 2 (4): 628-642 (2022)

Department

Computer Science