Computer Science ›› 2022, Vol. 49 ›› Issue (11): 293-301.doi: 10.11896/jsjkx.210800252

• Computer Network • Previous Articles     Next Articles

Application Layer Protocol Recognition Based on Residual Network and Recurrent Neural Network

WU Ji-sheng, HONG Zheng, MA Tian-tian, LIN Pei-hong   

  1. Command and Control Engineering College,Army Engineering University of PLA,Nanjing 210000,China
  • Received:2021-08-28 Revised:2021-12-07 Online:2022-11-15 Published:2022-11-03
  • About author:WU Ji-sheng,born in 1997,postgra-duate.His main research interests include cyberspace security and protocol recognition.
    HONG Zheng,born in 1979,Ph.D,associate professor.His main researchintere-sts include cyberspace security and protocol reverse engineering.
  • Supported by:
    National Key R & D Program of China(2017YFB0802900).

Abstract: Existing protocol recognition methods cannot effectively extract the temporal and spatial characteristics of protocol data,which leads to low accuracy of protocol recognition.An application layer protocol recognition method based on one dimensional residual network and recurrent neural network is proposed.The proposed model consists of one dimensional preactivated residual network(PreResNet) and bidirectional gated recurrent neural network(BiGRU).The PreResNet is used to extract spatial characteristics of the protocol data,and the BiGRU is used to extract temporal characteristics of the protocol data.The attention mechanism is used to extract the key features related to protocol recognition to improve the accuracy of protocol recognition.The proposed method firstly extracts the application layer protocol data from network traffic,and the data is preprocessed and transformed into one dimensional vectors.Then the classification model is trained with the training data and a mature protocol recognition model is obtained.Finally,the trained classification model is used to identify the application layer protocols.Experimental results on public dataset ISCX2012 show that the proposed protocol recognition model has an overall accuracy of 96.87% and an average F value of 96.81%,which are higher than those of other protocol recognition models.

Key words: Recurrent neural network, Residual network, Protocol recognition, Network security

CLC Number: 

  • TP398.08
[1]HE K M,ZHANG X Y,REN S Q,et al.Identity Mappings in Deep Residual Networks[C]//Proceedings of the European Conference on Computer Vision(ECCV).2016:630-645.
[2]LOPEZ-MARTIN M,CARRO B,SANCHEZ-ESGUEVILLASA,et al.Network Traffic Classifier With Convolutional and Recurrent Neural Networks for Internet of Things[J].IEEE Access,2017,5:18042-18050.
[3]CHUNG J Y,GULCEHRE C,CHO K,et al.Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling[J].arXiv:1412.3555,2014.
[4]ZHENG C,XUE M Y,HONG T T,et al.DC-BiGRU_CNNModel for Short-text Classification[J].Computer Science,2019,46(11):186-192.
[5]BAHDANAU D,CHO K,BENGIO Y.Neural Machine Translation by Jointly Learning to Align and Translate[J].arXiv:1409.0473,2014.
[6]MAO J W,HU Y Q,JIANG D,et al.CBFS:A Clustering-Based Feature Selection Mechanism for Network Anomaly Detection[J].IEEE Access,2020,8:116216-116225.
[7]MONSHIZADEH M,KHATRI V,GAMDOU M,et al.Improving Data Generalization With Variational Autoencoders for Network Traffic Anomaly Detection [J].IEEE Access,2021,9:56893-56907.
[8]CHEN W X,LYU F,WU F,et al.Sequential Message Characterization for Early Classification of Encrypted Internet Traffic [J].IEEE Transactions on Vehicular Technology,2021,70(4):3746-3760.
[9]LI D Q,WANG X,YU B,et al.Network Traffic Classification Method Based on One-Dimensional Convolution Neural Network[J].Computer Engineering and Applications,2020,56(3):94-99.
[10]ISLAM F U,LIU G J,ZHAI J T,et al.VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning [J].IEEE Access,2021,9:59783-59799.
[11]FENG W B,HONG Z,WU L F,et al.Network Protocol Recognition Based on Convolutional Neural Network[J].China Communications,2020,17(4):125-139.
[12]MA R L,QIN S J.Identification of unknown protocol trafficbased on deep learning[C]//2017 3rd IEEE International Conference on Computer and Communications(ICCC).2017:1195-1198.
[13]WANG Y,ZHOU H Y,FENG H,et al.Network traffic classification method basing on CNN[J].Journal on Communications,2018,39(1):14-23.
[14]RAN J,CHEN Y X,LI S L.Three-dimensional convolutional neural network based traffic classification for wireless communications[C]//2018 IEEE Global Conference on Signal and Information Processing(GlobalSIP).2018:624-627.
[15]LIPPMAN R,CUNNINGHAM R,FRIED D,et al.Results of the DARPA 1998 offline intrusion detection evalution[OL].https://ll.mit.edu/ideval/files/RAID_1999a.pdf.
[16]SHIRAVI A,SHIRAVI H,TAVALLAEE M,et al.Toward developing a systematic approach to generate benchmark datasets for intrusion detection[J].Computers & Security,2012,31(3):357-374.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[3] PENG Shuang, WU Jiang-jiang, CHEN Hao, DU Chun, LI Jun. Satellite Onboard Observation Task Planning Based on Attention Neural Network [J]. Computer Science, 2022, 49(7): 242-247.
[4] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[5] DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108.
[6] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[7] GAO Rong-hua, BAI Qiang, WANG Rong, WU Hua-rui, SUN Xiang. Multi-tree Network Multi-crop Early Disease Recognition Method Based on Improved Attention Mechanism [J]. Computer Science, 2022, 49(6A): 363-369.
[8] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[9] HAN Hong-qi, RAN Ya-xin, ZHANG Yun-liang, GUI Jie, GAO Xiong, YI Meng-lin. Study on Cross-media Information Retrieval Based on Common Subspace Classification Learning [J]. Computer Science, 2022, 49(5): 33-42.
[10] ZHAO Ren-xing, XU Pin-jie, LIU Yao. ECG-based Atrial Fibrillation Detection Based on Deep Convolutional Residual Neural Network [J]. Computer Science, 2022, 49(5): 186-193.
[11] YU Xin, LIN Zhi-liang. Novel Neural Network for Dealing with a Kind of Non-smooth Pseudoconvex Optimization Problems [J]. Computer Science, 2022, 49(5): 227-234.
[12] AN Xin, DAI Zi-biao, LI Yang, SUN Xiao, REN Fu-ji. End-to-End Speech Synthesis Based on BERT [J]. Computer Science, 2022, 49(4): 221-226.
[13] QU Zhong, CHEN Wen. Concrete Pavement Crack Detection Based on Dilated Convolution and Multi-features Fusion [J]. Computer Science, 2022, 49(3): 192-196.
[14] SHI Yu-tao, SUN Xiao. Conversational Comprehension Model for Question Generation [J]. Computer Science, 2022, 49(3): 232-238.
[15] LI Hao, CAO Shu-yu, CHEN Ya-qing, ZHANG Min. User Trajectory Identification Model via Attention Mechanism [J]. Computer Science, 2022, 49(3): 308-312.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!