Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection
نویسندگان
چکیده
With the increase of Internet visits and connections, it is becoming essential arduous to protect networks different devices Things (IoT) from malicious attacks. The intrusion detection systems (IDSs) based on supervised machine learning (ML) methods require a large number labeled samples. However, abnormal behaviors far less than that normal behaviors, let alone shots behavior samples which can be intercepted as training dataset are actually limited. Consequently, key research topic conduct anomaly for small This paper proposes an model with few solve problem in few-shot convolutional neural (CNN) autoencoder (AE). mainly consists CNN-based pretraining module AE-based data reconstruction module. Only utilized pretrain build structure extracting deep features. simply chooses features data. There also exist some effective attention mechanisms Through samples, accuracy improved compared merely AE. simulation results prove this solution above problems occurring network detection. In comparison original AE other clustering methods, proposed advances visible way.
منابع مشابه
Deep neural network-based bottleneck feature and denoising autoencoder-based dereverberation for distant-talking speaker identification
Deep neural network (DNN)-based approaches have been shown to be effective in many automatic speech recognition systems. However, few works have focused on DNNs for distant-talking speaker recognition. In this study, a bottleneck feature derived from a DNN and a cepstral domain denoising autoencoder (DAE)-based dereverberation are presented for distant-talking speaker identification, and a comb...
متن کاملFew-shot Object Detection
In this paper, we study object detection using a large pool of unlabeled images and only a few labeled images per category, named “few-shot object detection”. The key challenge consists in generating trustworthy training samples as many as possible from the pool. Using few training examples as seeds, our method iterates between model training and high-confidence sample selection. In training, e...
متن کاملLearning Invariant Representation for Malicious Network Traffic Detection
Statistical learning theory relies on an assumption that the joint distributions of observations and labels are the same in training and testing data. However, this assumption is violated in many real world problems, such as training a detector of malicious network traffic that can change over time as a result of attacker’s detection evasion efforts. We propose to address this problem by creati...
متن کاملFeature-based Malicious URL and Attack Type Detection Using Multi-class Classification
Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...
متن کاملAn Fpga-based System for Detecting Malicious Dns Network Traffic
Billions of packets traverse computer networks every day. Often, these packets have legitimate destinations such as buying a book at amazon.com or streaming a video. Unfortunately, malicious and suspicious network traffic continues to plague the Internet. One example is abusing the Domain Name System (DNS) protocol to exfiltrate sensitive data, establish backdoor tunnels, or control botnets. To...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2021/6659022