Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks

12/23/2020
by   Qingtian Zou, et al.
0

Network attacks have become a major security concern for organizations worldwide and have also drawn attention in the academics. Recently, researchers have applied neural networks to detect network attacks with network logs. However, public network data sets have major drawbacks such as limited data sample variations and unbalanced data with respect to malicious and benign samples. In this paper, we present a new approach, protocol fuzzing, to automatically generate high-quality network data, on which deep learning models can be trained. Our findings show that fuzzing generates data samples that cover real-world data and deep learning models trained with fuzzed data can successfully detect real network attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/16/2022

Phishing Detection Leveraging Machine Learning and Deep Learning: A Review

Phishing attacks trick victims into disclosing sensitive information. To...
research
09/23/2019

Adversarial Examples for Deep Learning Cyber Security Analytics

As advances in Deep Neural Networks demonstrate unprecedented levels of ...
research
11/02/2020

Frequency-based Automated Modulation Classification in the Presence of Adversaries

Automatic modulation classification (AMC) aims to improve the efficiency...
research
05/01/2023

A novel algorithm can generate data to train machine learning models in conditions of extreme scarcity of real world data

Training machine learning models requires large datasets. However, colle...
research
07/10/2019

Metamorphic Detection of Adversarial Examples in Deep Learning Models With Affine Transformations

Adversarial attacks are small, carefully crafted perturbations, impercep...
research
12/05/2019

Detection of Face Recognition Adversarial Attacks

Deep Learning methods have become state-of-the-art for solving tasks suc...
research
11/29/2022

Backdoor Vulnerabilities in Normally Trained Deep Learning Models

We conduct a systematic study of backdoor vulnerabilities in normally tr...

Please sign up or login with your details

Forgot password? Click here to reset