TY - GEN
T1 - GUCN
T2 - 2024 International Conference on Generative Artificial Intelligence and Information Security, GAIIS 2024
AU - Chang, Yue
AU - Zhao, Xiaolin
AU - Pei, Mingzhe
AU - Liu, Zhenyan
N1 - Publisher Copyright:
© 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM.
PY - 2024/5/10
Y1 - 2024/5/10
N2 - Malicious network behaviors significantly impact network and information security, the intelligent detection of network malicious behavior is an important work in the field of information and privacy protection. Traditional machine learning methods have achieved certain results in solving this problem, but generally ignore the continuous characteristics of malicious network behavior in time series. Aiming at this weakness, this paper proposes a Gated Unit Convolutional Networks (GUCN) model based on gated recurrent unit and convolutional neural network. Meanwhile, it also uses the feature screening method of random forest and the data dimension reduction method of UMAP to process the high dimensional data, which reduces the data redundancy. The results show that the method can effectively detect malicious network behavior, and because it can learn the objective characteristics of behavior in time series, it has the potential to identify malicious attack behavior in advance.
AB - Malicious network behaviors significantly impact network and information security, the intelligent detection of network malicious behavior is an important work in the field of information and privacy protection. Traditional machine learning methods have achieved certain results in solving this problem, but generally ignore the continuous characteristics of malicious network behavior in time series. Aiming at this weakness, this paper proposes a Gated Unit Convolutional Networks (GUCN) model based on gated recurrent unit and convolutional neural network. Meanwhile, it also uses the feature screening method of random forest and the data dimension reduction method of UMAP to process the high dimensional data, which reduces the data redundancy. The results show that the method can effectively detect malicious network behavior, and because it can learn the objective characteristics of behavior in time series, it has the potential to identify malicious attack behavior in advance.
KW - GUCN
KW - Machine learning
KW - Malicious network behavior
KW - Privacy protection
UR - http://www.scopus.com/inward/record.url?scp=85198976956&partnerID=8YFLogxK
U2 - 10.1145/3665348.3665397
DO - 10.1145/3665348.3665397
M3 - Conference contribution
AN - SCOPUS:85198976956
T3 - ACM International Conference Proceeding Series
SP - 285
EP - 291
BT - Proceedings of 2024 International Conference on Generative Artificial Intelligence and Information Security, GAIIS 2024
PB - Association for Computing Machinery
Y2 - 10 May 2024 through 12 May 2024
ER -