Citation: Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 15, pages 501–504 (2018)
Abstract. Automatic detection abnormal behaviour of computer network users is a desirable and hard to achieve feature. We show that convolutional neural networks are able to classify users in local computer networks based on features of web pages which were requested by a user (e.g. URL address, URL category, the day of week or time when the web page was visited). We demonstrate our approach on data collected from a firewall over an eight-month period. This network traffic meta-data allowed to achieve satisfactory classification accuracy on unseen, future network traffic data.
- N. Clarke, F. Li, and S. Furnell, “A novel privacy preserving user identification approach for network traffic,” Computers & Security, vol. 70, pp. 335 – 350, 2017. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167404817301384
- P. Yan, “Mapreduce and semantics enabled event detection using social media,” Journal of Artificial Intelligence and Soft Computing Research, vol. 7, no. 3, pp. 201–213, 2017.
- A. Aupy and N. Clarke, “User authentication by service utilisation profiling,” in Proceedings of the ISOneWorld 2005, Las Vegas, USA, 2005.
- G. Bologna and Y. Hayashi, “Characterization of symbolic rules embedded in deep dimlp networks: a challenge to transparency of deep learning,” Journal of Artificial Intelligence and Soft Computing Research, vol. 7, no. 4, pp. 265–286, 2017.
- Y. Ke and M. Hagiwara, “An english neural network that learns texts, finds hidden knowledge, and answers questions,” Journal of Artificial Intelligence and Soft Computing Research, vol. 7, no. 4, pp. 229–242, 2017.
- T. Minemoto, T. Isokawa, H. Nishimura, and N. Matsui, “Pseudo-orthogonalization of memory patterns for complex-valued and quaternionic associative memories,” Journal of Artificial Intelligence and Soft Computing Research, vol. 7, no. 4, pp. 257–264, 2017.
- O. Chang, P. Constante, A. Gordon, and M. Singana, “A novel deep neural network that uses space-time features for tracking and recognizing a moving object,” Journal of Artificial Intelligence and Soft Computing Training Research, vol. 7, no. 2, pp. 125–136, 2017. Validation
- A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016.
- B. Lee, S. Amaresh, C. Green, and D. Engels, “Comparative study of deep learning models for network intrusion detection,” SMU Data Science Review, vol. 1, no. 1, p. 8, 2018.
- Z. Marszalek, M. Wozniak, G. Borowik, R. Wazirali, C. Napoli, G. Pappalardo, and E. Tramontana, “Benchmark tests on improved merge for big data processing,” in 2015 Asia-Pacific Conference on Computer Aided System Engineering, July 2015, pp. 96–101.
- Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning applied to document recognition,” Proceedings of the IEEE, vol. 86, no. 11, pp. 2278–2324, 1998.
- X. Zhang, J. Zhao, and Y. LeCun, “Character-level convolutional networks for text classification,” in Proceedings of the 28th International Conference on Neural Information Processing Systems - Volume 1, ser. NIPS’15. Cambridge, MA, USA: MIT Press, 2015, pp. 649–657. [Online]. Available: http://dl.acm.org/citation.cfm?id=2969239.2969312
- D. E. Rumelhart, G. E. Hinton, R. J. Williams et al., “Learning representations by back-propagating errors,” Cognitive modeling, vol. 5, Training no. 3, p. 1, 1988. Validation
- A. Conneau, H. Schwenk, Y. Cun, and L. Barrault, “Very deep convolutional networks for text classification,” in Long Papers - Continued, vol. 1. Association for Computational Linguistics (ACL), 1 2017, pp. 1107–1116.