首页 | 本学科首页   官方微博 | 高级检索  
     

基于可变长序列的恶意加密流量检测方法
引用本文:江 魁,陈小雷,顾杜娟,李文瑾,李越挺. 基于可变长序列的恶意加密流量检测方法[J]. 福州大学学报(自然科学版), 2023, 51(5): 711-716
作者姓名:江 魁  陈小雷  顾杜娟  李文瑾  李越挺
作者单位:深圳大学,深圳大学,绿盟科技集团股份有限公司,绿盟科技集团股份有限公司,深圳大学
基金项目:中国计算机学会CCF-绿盟科技“鲲鹏”科研基金资助项目(CCF-NSFOCUS 2021006)
摘    要:本文引入组合恶意加密流量数据集,结合随机森林对各个特征的重要性进行对比,构建可变长二维特征序列,提出一种针对可变长序列的恶意加密流量检测方法。该方法采用BiGRU-CNN深度学习模型,通过引入Masking层,有效解决变长序列问题,能够同时提取流量数据中时间和空间的多重特征,最终实现对恶意加密流量的二分类检测。实验结果表明,该方法与基于CNN、LSTM等单一模型相比在精确率、召回率和F1值均有所提升,准确率达到94.61%,且在非训练集实验中能达到94.93%的平均识别准确率,具有较好的应用价值。

关 键 词:恶意加密流量;深度学习;变长序列;卷积神经网络;双向门控循环单元
收稿时间:2023-10-06
修稿时间:2023-10-18

A malicious encrypted traffic detection method based on variable-length sequence
JIANG Kui,CHEN Xiaolei,GU Dujuan,LI Wenjin,LI Yueting. A malicious encrypted traffic detection method based on variable-length sequence[J]. Journal of Fuzhou University(Natural Science Edition), 2023, 51(5): 711-716
Authors:JIANG Kui  CHEN Xiaolei  GU Dujuan  LI Wenjin  LI Yueting
Affiliation:Shenzhen University,Shenzhen University,NSFOCUS Technologies Group Co., Ltd.,NSFOCUS Technologies Group Co., Ltd.,Shenzhen University
Abstract:This paper introduces a combined malicious encrypted traffic dataset, constructs a variable-length two-dimensional feature sequence with comparing the importance of each feature with random forests, and proposes a malicious encrypted traffic detection method for variable-length sequence. This method adopts the BiGRU-CNN deep learning model and introduces the Masking layer to effectively solve the problem of variable-length sequence. It can simultaneously extract multiple temporal and spatial features in traffic data, fulfilling binary detection of malicious encrypted traffic at last. The experimental results show that compared with single models etc such as CNN and LSTM, the method improves the precision rate, recall rate and F1 value, and the accuracy rate reaches 94.61%, and it can achieve an average recognition accuracy of 94.93% in non-training dataset experiments. This method has good application value.
Keywords:malicious encrypted traffic   deep learning   variable-length sequence   CNN   BiGRU
点击此处可从《福州大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《福州大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号