In response to the HTTP malicious traffic detection problem
a preprocessing method based on cutting mechanism and statistical association was proposed to perform statistical information correlation as well as normalization processing of traffic.Then
a hybrid neural network was proposed based on the combination of raw data and empirical feature engineering.It combined convolutional neural network (CNN) and multilayer perceptron (MLP) to process text and statistical information.The effect of the model was significantly improved compared with traditional machine learning algorithms (e.g.
SVM).The F
1
value reached 99.38% and had a lower time complexity.At the same time
a data set consisting of more than 450 000 malicious traffic and more than 20 million non-malicious traffic was created.In addition
prototype system based on model was designed with detection precision of 98.1%~99.99% and recall rate of 97.2%~99.5%.The application is excellent in real network environment.
NIEC . A survey of china's internet security situation [R ] . China Internet Network Information Center . National Internet Emergency Center . 2017
LI Z , ZHANG K , XIE Y , et al . Knowing your enemy:understanding and detecting malicious web advertising [C ] // The 2012 ACM Conference on Computer and Communications Security . 2012 : 674 - 686 .
GU G , ZHANG J , LEE W . BotSniffer:detecting botnet command and control channels in network traffic [C ] // The Network and Distributed System Security Symposium . 2008 .
GU G , PERDISCI R , ZHANG J , et al . BotMiner:clustering analysis of network traffic for protocol-and structure-independent botnet detection [C ] // The 17th USENIX Security Symposium . 2018 : 139 - 154 .
CAO J , LI Q , Y JI , et al . Detection of forwarding-based malicious URLs in online social networks [J ] . International Journal of Parallel Programming , 2016 , 44 ( 1 ): 163 - 180 .
ADEWOLE K S , ANUAR N B , et al . Malicious accounts:dark of the social networks [J ] . Journal of Network and Computer Applications , 2017 , 79 : 41 - 67 .
SHIN E C R , SONG D , MOAZZEZI R . Recognizing functions in binaries with neural networks [C ] // USENIX Security Symposium . 2015 : 611 - 626 .
YUAN Z , LU Y , WANG Z , et al . Droid-sec:deep learning in android malware detection [C ] // ACM SIGCOMM Computer Communication Review . 2014 , 44 ( 4 ): 371 - 372 .
YUAN Z , LU Y , XUE Y . Droiddetector:android malware characterization and detection using deep learning [J ] . Tsinghua Science and Technology , 2016 , 21 ( 1 ): 114 - 123 .
KIM J , KIM J , THU H L T , et al . Long short term memory recurrent neural network classifier for intrusion detection [C ] // Platform Technology and Service (PlatCon),2016 International Conference on . IEEE , 2016 : 1 - 5 .
SALAMA M A , EID H F , RAMADAN R A , et al . Hybrid intelligent intrusion detection scheme [M ] . Soft Berlin Computing in Industrial Applications . 2011 : 293 - 303 .
NASRABADI N M . Pattern recognition and machine learning [J ] . Journal of Electronic Imaging , 2007 , 16 ( 4 ):049901
ROSENBLATT F . The perceptron:a probabilistic model for information storage and organization in the brain [J ] . Psychological Review , 1958 , 65 ( 6 ): 386 .
RUMELHART D E , HINTON G E , WILLIAMS R J . Learning representations by back-propagating errors [J ] . Nature , 1986 , 323 ( 6088 ): 533 .
WATSON M R , MARNERIDES A K , MAUTHE A , et al . Malware detection in cloud computing infrastructures [J ] . IEEE Transactions on Dependable and Secure Computing , 2016 , 13 ( 2 ): 192 - 205 .
MO Y , XING L , ZHONG F , et al . Reliability evaluation of network systems with dependent propagated failures using decision diagrams [J ] . IEEE Transactions on Dependable and Secure Computing , 2016 , 13 ( 6 ): 672 - 683 .