Papers
Topics
Authors
Recent
Search
2000 character limit reached

A Transformer-Based Framework for Payload Malware Detection and Classification

Published 27 Mar 2024 in cs.CR, cs.AI, and cs.LG | (2403.18223v1)

Abstract: As malicious cyber threats become more sophisticated in breaching computer networks, the need for effective intrusion detection systems (IDSs) becomes crucial. Techniques such as Deep Packet Inspection (DPI) have been introduced to allow IDSs analyze the content of network packets, providing more context for identifying potential threats. IDSs traditionally rely on using anomaly-based and signature-based detection techniques to detect unrecognized and suspicious activity. Deep learning techniques have shown great potential in DPI for IDSs due to their efficiency in learning intricate patterns from the packet content being transmitted through the network. In this paper, we propose a revolutionary DPI algorithm based on transformers adapted for the purpose of detecting malicious traffic with a classifier head. Transformers learn the complex content of sequence data and generalize them well to similar scenarios thanks to their self-attention mechanism. Our proposed method uses the raw payload bytes that represent the packet contents and is deployed as man-in-the-middle. The payload bytes are used to detect malicious packets and classify their types. Experimental results on the UNSW-NB15 and CIC-IOT23 datasets demonstrate that our transformer-based model is effective in distinguishing malicious from benign traffic in the test dataset, attaining an average accuracy of 79\% using binary classification and 72\% on the multi-classification experiment, both using solely payload bytes.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (5)
  1. P. Patheja, M. Kulkarni. (2016). A Deep Learning Approach for Network Intrusion Detection System. In Proceedings of the Ninth International Conference on Ubiquitous and Future Networks (ICUFN) (pp. 63-68). IEEE.
  2. S. Gallagher. Nearly half of malware now use TLS to conceal communications. [Online]. Available. https://news.sophos.com/en-us/2021/04/21/nearly-half-of-malware-now-use-tls-to-conceal-communications/
  3. Moustafa, N. and Slay, J., “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” 2015 Military Communications and Information Systems Conference (MilCIS), 1–6, IEEE, Canberra, Australia (2015).
  4. PyCryptodome. (n.d.). AES - Advanced Encryption Standard. Retrieved from https://pycryptodome.readthedocs.io/en/latest/src/cipher/aes.html
  5. Cryptography.io. Fernet (symmetric encryption). (n.d.). Retrieved from https://cryptography.io/en/latest/fernet/”
Citations (2)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.