Please use this identifier to cite or link to this item:
http://hdl.handle.net/20.500.12188/21165
Title: | Feature extraction based on word embedding models for intrusion detection in network traffic | Authors: | Corizzo, Roberto Zdravevski, Eftim Russell, Myles Vagliano, Andrew Japkowicz, Nathalie |
Keywords: | Feature extraction, intrusion detection, network traffic, anomaly detection, word embeddings, language models | Issue Date: | 28-Dec-2020 | Publisher: | OAE Publishing Inc. | Journal: | Journal of Surveillance, Security and Safety | Abstract: | Aim: The analysis of network traffic plays a crucial role in modern organizations since it can provide defense mechanisms against cyberattacks. In this context, machine learning algorithms can be fruitfully adopted to identify malicious patterns in network sessions. However, they cannot be directly applied to a raw data representation of network traffic. An active thread of research focuses on the design and implementation of feature extraction techniques that aim at mapping raw data representations of network traffic sessions to a new representation that can be processed by machine learning algorithms. Methods: In this paper, we propose a feature extraction approach based on word embedding models. The proposed approach extracts semantic features characterized by contextual information that is hidden in the raw data representation. Results: Our experiments conducted on three datasets showed that our feature extraction approach based on word embedding models has the potential to increase the classification performance of conventional machine learning algorithms that are applied to intrusion detection, and it is competitive with known feature extraction baselines in the state-of-the-art. Conclusion: This study shows that word embedding models can be used to carry out intrusion detection tasks accurately. Feature extraction based on word embedding models requires a higher computational time than simpler techniques, but leads to a higher accuracy, which is important for the identification of complex attacks. | URI: | http://hdl.handle.net/20.500.12188/21165 |
Appears in Collections: | Faculty of Computer Science and Engineering: Journal Articles |
Show full item record
Page view(s)
163
checked on Nov 9, 2024
Download(s)
88
checked on Nov 9, 2024
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.