Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3426020.3426093acmotherconferencesArticle/Chapter ViewAbstractPublication PagessmaConference Proceedingsconference-collections
short-paper

AutoEncoder Based Feature Extraction for Multi-Malicious Traffic Classification

Published: 04 November 2021 Publication History

Abstract

In recent years, research is being activated to classify deep learning-based malicious network traffic. Malicious network traffic classification has a problem of wasting time by learning meaningless features due to a large number of traffic and high-dimensional features. In this paper, we propose a technique for feature extraction based on AutoEncoder and classifying malicious network traffic through a random forest classifier. This technique reduces the time and spatial complexity required in the intrusion detection system by extracting features from high-dimensional data. To evaluate this technique, the performance of AE-RF and Single-RF classifiers is measured for Accuracy, Precision, Recall and F-Score using the CICIDS 2017 data set. The evaluation showed that AE-RF has an accuracy of 98% or more, which shows excellent performance and detection speed.

References

[1]
[1] Bahareh Abolhasanzadeh. 2015. Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features. In 2015 7th Conference on Information and Knowledge Technology (IKT). IEEE, 1–5.
[2]
[2] Md Zahangir Alom and Tarek M Taha. 2017. Network intrusion detection for cyber security using unsupervised deep learning approaches. In 2017 IEEE National Aerospace and Electronics Conference (NAECON). IEEE, 63–69.
[3]
[3] Kazuki Hara and Kohei Shiomoto. 2020. Intrusion Detection System using Semi- Supervised Learning with Adversarial Auto-encoder. In NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium. IEEE, 1–8.
[4]
[4] Vinod Kumar, Vinay Choudhary, Vivek Sahrawat, and Vinay Kumar. 2020. Detecting Intrusions and Attacks in the Network Traffic using Anomaly based Techniques. In 2020 5th International Conference on Communication and Electronics Systems (ICCES). IEEE, 554–560.
[5]
[5] Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Asaf Shabtai, Dominik Breitenbacher, and Yuval Elovici. 2018. N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing 17, 3 (2018), 12–22.
[6]
[6] Soosan Naderi Mighan and Mohsen Kahani. 2018. Deep learning based latent feature extraction for intrusion detection. In Electrical Engineering (ICEE), Iranian Conference on. IEEE, 1511–1516.
[7]
[7] Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In ICISSP. 108–116.
[8]
[8] Shreekh Wankhede and Deepak Kshirsagar. 2018. DoS attack detection using machine learning and neural network. In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA). IEEE, 1–5.
[9]
[9] Sungwoong Yeom and Kyungbaek Kim. 2019. Detail Analysis on Machine Learning based Malicious Network Traffic Classification. In the Eighth International Conference on Smart Media and Applications (SMA 2019). KISM, 49–53.

Cited By

View all
  • (2024)NetTiSAComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.110147240:COnline publication date: 16-May-2024
  • (2023)Deep Autoencoder-Based Integrated Model for Anomaly Detection and Efficient Feature Extraction in IoT NetworksIoT10.3390/iot40300164:3(345-365)Online publication date: 25-Aug-2023
  • (2023)SelANet: decision-assisting selective sleep apnea detection based on confidence scoreBMC Medical Informatics and Decision Making10.1186/s12911-023-02292-323:1Online publication date: 21-Sep-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SMA 2020: The 9th International Conference on Smart Media and Applications
September 2020
491 pages
ISBN:9781450389259
DOI:10.1145/3426020
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Classification
  2. Feature extraction
  3. IDS

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Funding Sources

  • Institute for Information and Communications Technology Promotion
  • National Research Foundation of Korea

Conference

SMA 2020

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)32
  • Downloads (Last 6 weeks)2
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)NetTiSAComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.110147240:COnline publication date: 16-May-2024
  • (2023)Deep Autoencoder-Based Integrated Model for Anomaly Detection and Efficient Feature Extraction in IoT NetworksIoT10.3390/iot40300164:3(345-365)Online publication date: 25-Aug-2023
  • (2023)SelANet: decision-assisting selective sleep apnea detection based on confidence scoreBMC Medical Informatics and Decision Making10.1186/s12911-023-02292-323:1Online publication date: 21-Sep-2023

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media