Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics

Author(s):  
Sonam Bhardwaj ◽  
Mayank Dave
Author(s):  
Narayan Bhusal ◽  
Mukesh Gautam ◽  
Raj Mani Shukla ◽  
Mohammed Benidris ◽  
Shamik Sengupta

2021 ◽  
pp. 1-30
Author(s):  
Qingtian Zou ◽  
Anoop Singhal ◽  
Xiaoyan Sun ◽  
Peng Liu

Network attacks have become a major security concern for organizations worldwide. A category of network attacks that exploit the logic (security) flaws of a few widely-deployed authentication protocols has been commonly observed in recent years. Such logic-flaw-exploiting network attacks often do not have distinguishing signatures, and can thus easily evade the typical signature-based network intrusion detection systems. Recently, researchers have applied neural networks to detect network attacks with network logs. However, public network data sets have major drawbacks such as limited data sample variations and unbalanced data with respect to malicious and benign samples. In this paper, we present a new end-to-end approach based on protocol fuzzing to automatically generate high-quality network data, on which deep learning models can be trained for network attack detection. Our findings show that protocol fuzzing can generate data samples that cover real-world data, and deep learning models trained with fuzzed data can successfully detect the logic-flaw-exploiting network attacks.


Author(s):  
Jun Zhang ◽  
Lei Pan ◽  
Qing-Long Han ◽  
Chao Chen ◽  
Sheng Wen ◽  
...  

Author(s):  
Zuleyha Yiner ◽  
Nurefsan Sertbas ◽  
Safak Durukan-Odabasi ◽  
Derya Yiltas-Kaplan

Cloud computing that aims to provide convenient, on-demand, network access to shared software and hardware resources has security as the greatest challenge. Data security is the main security concern followed by intrusion detection and prevention in cloud infrastructure. In this chapter, general information about cloud computing and its security issues are discussed. In order to prevent or avoid many attacks, a number of machine learning algorithms approaches are proposed. However, these approaches do not provide efficient results for identifying unknown types of attacks. Deep learning enables to learning features that are more complex, and thanks to the collection of big data as a training data, deep learning achieves more successful results. Many deep learning algorithms are proposed for attack detection. Deep networks architecture is divided into two categories, and descriptions for each architecture and its related attack detection studies are discussed in the following section of chapter.


Sign in / Sign up

Export Citation Format

Share Document