download220 view689
twitter facebook

공공누리This item is licensed Korea Open Government License

dc.contributor.author
Kwon, Taewoong
dc.contributor.author
Myung, Joonwoo
dc.contributor.author
Lee, Jun
dc.contributor.author
Kim, Kyu-il
dc.contributor.author
Song, Jungsuk
dc.date.accessioned
2023-02-23T06:37:35Z
dc.date.available
2023-02-23T06:37:35Z
dc.date.issued
2022-06-20
dc.identifier.issn
2287-4577
dc.identifier.uri
https://repository.kisti.re.kr/handle/10580/18164
dc.description.abstract
With the development of networks and the increase in the number of network devices, the number of cyber attacks targeting them is also increasing. Since these cyber-attacks aim to steal important information and destroy systems, it is necessary to minimize social and economic damage through early detection and rapid response. Many studies using machine learning (ML) and artificial intelligence (AI) have been conducted, among which payload learning is one of the most intuitive and effective methods to detect malicious behavior. In this study, we propose a preprocessing method to maximize the performance of the model when learning the payload in term units. The proposed method constructs a high-quality learning data set by eliminating unnecessary noise (stopwords) and preserving important features in consideration of the machine language and natural language characteristics of the packet payload. Our method consists of three steps: Preserving significant special characters, Generating a stopword list, and Class label refinement. By processing packets of various and complex structures based on these three processes, it is possible to make high-quality training data that can be helpful to build high-performance ML/AI models for security monitoring. We prove the effectiveness of the proposed method by comparing the performance of the AI model to which the proposed method is applied and not. Forthermore, by evaluating the performance of the AI model applied proposed method in the real-world Security Operating Center (SOC) environment with live network traffic, we demonstrate the applicability of the our method to the real environment.
dc.format
application/pdf
dc.language.iso
eng
dc.publisher
Korea Institute of Science and Technology Information
dc.relation.ispartofseries
Journal of Information Science Theory and Practice;Volume 10 Special Issue
dc.title
A Network Packet Analysis Method to Discover Malicious Activities
dc.type
Serial
dc.identifier.doi
https://doi.org/10.1633/JISTaP.2022.10.S.14
dc.contributor.approver
KOAR, ADMIN
dc.date.dateaccepted
2023-02-23T06:37:35Z
dc.date.datesubmitted
2023-02-23T06:37:35Z
dc.subject.keyword
security monitoring
dc.subject.keyword
data preprocessing
dc.subject.keyword
machine learning
dc.subject.keyword
artificial intelligence
dc.subject.keyword
natural language processing
Appears in Collections:
8. KISTI 간행물 > JISTaP > Vol. 10 - Special Issue
Files in This Item:
Thumbnail A Network Packet Analysis Method to Discover Malicious Activities.pdf438.58 kBDownload

Browse