Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/21165
Title: Feature extraction based on word embedding models for intrusion detection in network traffic
Authors: Corizzo, Roberto
Zdravevski, Eftim 
Russell, Myles
Vagliano, Andrew
Japkowicz, Nathalie
Keywords: Feature extraction, intrusion detection, network traffic, anomaly detection, word embeddings, language models
Issue Date: 28-Dec-2020
Publisher: OAE Publishing Inc.
Journal: Journal of Surveillance, Security and Safety
Abstract: Aim: The analysis of network traffic plays a crucial role in modern organizations since it can provide defense mechanisms against cyberattacks. In this context, machine learning algorithms can be fruitfully adopted to identify malicious patterns in network sessions. However, they cannot be directly applied to a raw data representation of network traffic. An active thread of research focuses on the design and implementation of feature extraction techniques that aim at mapping raw data representations of network traffic sessions to a new representation that can be processed by machine learning algorithms. Methods: In this paper, we propose a feature extraction approach based on word embedding models. The proposed approach extracts semantic features characterized by contextual information that is hidden in the raw data representation. Results: Our experiments conducted on three datasets showed that our feature extraction approach based on word embedding models has the potential to increase the classification performance of conventional machine learning algorithms that are applied to intrusion detection, and it is competitive with known feature extraction baselines in the state-of-the-art. Conclusion: This study shows that word embedding models can be used to carry out intrusion detection tasks accurately. Feature extraction based on word embedding models requires a higher computational time than simpler techniques, but leads to a higher accuracy, which is important for the identification of complex attacks.
URI: http://hdl.handle.net/20.500.12188/21165
Appears in Collections:Faculty of Computer Science and Engineering: Journal Articles

Files in This Item:
File Description SizeFormat 
3836.pdf745.57 kBAdobe PDFView/Open
Show full item record

Page view(s)

118
checked on Apr 18, 2024

Download(s)

77
checked on Apr 18, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.