Darknet Traffic Big-Data Analysis and Network Management to Real-Time
Automating the Malicious Intent Detection Process by a Weight Agnostic Neural
Networks Framework
- URL: http://arxiv.org/abs/2102.08411v1
- Date: Tue, 16 Feb 2021 19:03:25 GMT
- Title: Darknet Traffic Big-Data Analysis and Network Management to Real-Time
Automating the Malicious Intent Detection Process by a Weight Agnostic Neural
Networks Framework
- Authors: Konstantinos Demertzis, Konstantinos Tsiknas, Dimitrios Takezis,
Charalabos Skianis and Lazaros Iliadis
- Abstract summary: We propose a novel darknet traffic analysis and network management framework to real-time automating the malicious intent detection process.
It is an effective and accurate computational intelligent tool for network traffic analysis, the demystification of malware traffic, and encrypted traffic identification in real-time.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Attackers are perpetually modifying their tactics to avoid detection and
frequently leverage legitimate credentials with trusted tools already deployed
in a network environment, making it difficult for organizations to proactively
identify critical security risks. Network traffic analysis products have
emerged in response to attackers relentless innovation, offering organizations
a realistic path forward for combatting creative attackers. Additionally,
thanks to the widespread adoption of cloud computing, Device Operators
processes, and the Internet of Things, maintaining effective network visibility
has become a highly complex and overwhelming process. What makes network
traffic analysis technology particularly meaningful is its ability to combine
its core capabilities to deliver malicious intent detection. In this paper, we
propose a novel darknet traffic analysis and network management framework to
real-time automating the malicious intent detection process, using a weight
agnostic neural networks architecture. It is an effective and accurate
computational intelligent forensics tool for network traffic analysis, the
demystification of malware traffic, and encrypted traffic identification in
real-time. Based on Weight Agnostic Neural Networks methodology, we propose an
automated searching neural net architectures strategy that can perform various
tasks such as identify zero-day attacks. By automating the malicious intent
detection process from the darknet, the advanced proposed solution is reducing
the skills and effort barrier that prevents many organizations from effectively
protecting their most critical assets.
Related papers
- Advancing Security in AI Systems: A Novel Approach to Detecting
Backdoors in Deep Neural Networks [3.489779105594534]
backdoors can be exploited by malicious actors on deep neural networks (DNNs) and cloud services for data processing.
Our approach leverages advanced tensor decomposition algorithms to meticulously analyze the weights of pre-trained DNNs and distinguish between backdoored and clean models.
This advancement enhances the security of deep learning and AI in networked systems, providing essential cybersecurity against evolving threats in emerging technologies.
arXiv Detail & Related papers (2024-03-13T03:10:11Z) - Darknet Traffic Analysis A Systematic Literature Review [0.0]
The objective of an anonymity tool is to protect the anonymity of its users through the implementation of strong encryption and obfuscation techniques.
The strong anonymity feature also functions as a refuge for those involved in illicit activities who aim to avoid being traced on the network.
This paper presents a comprehensive analysis of methods of darknet traffic using machine learning techniques to monitor and identify the traffic attacks inside the darknet.
arXiv Detail & Related papers (2023-11-27T19:27:50Z) - Graph Neural Networks for Decentralized Multi-Agent Perimeter Defense [111.9039128130633]
We develop an imitation learning framework that learns a mapping from defenders' local perceptions and their communication graph to their actions.
We run perimeter defense games in scenarios with different team sizes and configurations to demonstrate the performance of the learned network.
arXiv Detail & Related papers (2023-01-23T19:35:59Z) - Quantization-aware Interval Bound Propagation for Training Certifiably
Robust Quantized Neural Networks [58.195261590442406]
We study the problem of training and certifying adversarially robust quantized neural networks (QNNs)
Recent work has shown that floating-point neural networks that have been verified to be robust can become vulnerable to adversarial attacks after quantization.
We present quantization-aware interval bound propagation (QA-IBP), a novel method for training robust QNNs.
arXiv Detail & Related papers (2022-11-29T13:32:38Z) - Network Activities Recognition and Analysis Based on Supervised Machine
Learning Classification Methods Using J48 and Na\"ive Bayes Algorithm [1.6181085766811525]
The application of machine learning methods based on supervised classification technology would help liberate the network security staff from the heavy and boring tasks.
A finetuned model would accurately recognize user behavior, which could provide persistent monitoring with a relative high accuracy and good adaptability.
arXiv Detail & Related papers (2021-05-28T09:44:14Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - Increasing the Confidence of Deep Neural Networks by Coverage Analysis [71.57324258813674]
This paper presents a lightweight monitoring architecture based on coverage paradigms to enhance the model against different unsafe inputs.
Experimental results show that the proposed approach is effective in detecting both powerful adversarial examples and out-of-distribution inputs.
arXiv Detail & Related papers (2021-01-28T16:38:26Z) - IoT Malware Network Traffic Classification using Visual Representation
and Deep Learning [1.7205106391379026]
We propose a novel IoT malware traffic analysis approach using deep learning and visual representation.
The detection of malicious network traffic in the proposed approach works at the package level, significantly reducing the time of detection.
The experimental results of Residual Neural Network (ResNet50) are very promising, providing a 94.50% accuracy rate for detection of malware traffic.
arXiv Detail & Related papers (2020-10-04T22:44:04Z) - Certifiable Robustness to Adversarial State Uncertainty in Deep
Reinforcement Learning [40.989393438716476]
Deep Neural Network-based systems are now the state-of-the-art in many robotics tasks, but their application in safety-critical domains remains dangerous without formal guarantees on network robustness.
Small perturbations to sensor inputs are often enough to change network-based decisions, which was recently shown to cause an autonomous vehicle to swerve into another lane.
This work leverages research on certified adversarial robustness to develop an online certifiably robust for deep reinforcement learning algorithms.
arXiv Detail & Related papers (2020-04-11T21:36:13Z) - Automating Botnet Detection with Graph Neural Networks [106.24877728212546]
Botnets are now a major source for many network attacks, such as DDoS attacks and spam.
In this paper, we consider the neural network design challenges of using modern deep learning techniques to learn policies for botnet detection automatically.
arXiv Detail & Related papers (2020-03-13T15:34:33Z) - Machine Learning based Anomaly Detection for 5G Networks [0.0]
This paper proposes SDS (Software Defined Security) as a means to provide an automated, flexible and scalable network defence system.
SDS will harness current advances in machine learning to design a CNN (Convolutional Neural Network) using NAS (Neural Architecture Search) to detect anomalous network traffic.
arXiv Detail & Related papers (2020-03-07T00:17:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.