Title
Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection
Abstract
Flow-based network attack detection technology is able to identify many threats in network traffic. Existing techniques have several drawbacks: i) rule-based approaches are vulnerable because it needs all the signatures defined for the possible attacks, ii) anomaly-based approaches are not efficient because it is easy to find ways to launch attacks that bypass detection, and iii) both rule-based and anomaly-based approaches heavily rely on domain knowledge of networked system and cyber security. The major challenge to existing methods is to understand novel attack scenarios and design a model to detect novel and more serious attacks. In this paper, we investigate network attacks and unveil the key activities and the relationships between these activities. For that reason, we propose methods to understand the network security practices using theoretic concepts such as graph kernels. In addition, we integrate graph kernels over deep learning architecture to exploit the relationship expressiveness among network flows and combine ability of deep neural networks (DNNs) with deep architectures to learn hidden representations, based on the communication representation graph of each network flow in a specific time interval, then the flow-based network attack detection can be done effectively by measuring the similarity between the graphs to two flows. The proposed study provides the effectiveness to obtain insights about network attacks and detect network attacks. Using two real-world datasets which contain several new types of network attacks, we achieve significant improvements in accuracies over existing network attack detection tasks.
Year
DOI
Venue
2019
10.1109/TrustCom/BigDataSE.2019.00049
2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
Keywords
Field
DocType
Network attack detection,graph kernel,deep learning architecture
Graph kernel,Flow network,Architecture,Domain knowledge,Computer science,Network security,Flow (psychology),Computer network,Exploit,Artificial intelligence,Deep learning,Machine learning
Conference
ISSN
ISBN
Citations 
2324-898X
978-1-7281-2778-1
0
PageRank 
References 
Authors
0.34
9
4
Name
Order
Citations
PageRank
Liya Su142.80
Yepeng Yao252.82
Zhigang Lu3106.68
Baoxu Liu4105.62