Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Deep Learning for Detecting Network Attacks: An End to End approach

Published

Author(s)

Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu

Abstract

Network attack is still a major security concern for organizations worldwide. Recently, researchers have started to apply neural networks to detect network attacks by leveraging network traÿc data. However, public network data sets have major drawbacks such as limited data sample variations and unbalanced data with respect to malicious and benign samples. In this paper, we present a new end-to-end approach to automatically generate high-quality network data using protocol fuzzing, and train the deep learning models using the fuzzed data to detect the network attacks that exploit the logic faws within the network protocols. Our fndings show that fuzzing generates data samples that cover real-world data and deep learning models trained with fuzzed data can successfully detect real network attacks.
Proceedings Title
DBSec 2021: Data and Applications Security and Privacy XXXV
Volume
12840
Conference Dates
July 19-20, 2021
Conference Location
Virtual, US
Conference Title
35TH Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC'21)

Keywords

Network attack, Protocol fuzzing, Deep learning

Citation

Zou, Q. , Singhal, A. , Sun, X. and Liu, P. (2021), Deep Learning for Detecting Network Attacks: An End to End approach, DBSec 2021: Data and Applications Security and Privacy XXXV, Virtual, US, [online], https://doi.org/10.1007/978-3-030-81242-3_13, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=930878 (Accessed June 17, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created July 19, 2021, Updated November 18, 2021