BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks

Detecting exploits is crucial since the effect of undetected ones can be devastating. Identifying their presence on the network allows us to respond and block their malicious payload before they cause damage to the system. Inspecting the payload of network traffic may offer better performance in det...

Full description

Bibliographic Details
Main Authors: Baskoro A. Pratomo, Pete Burnap, George Theodorakopoulos
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2020/8826038
id doaj-79a2d0d9ca5d4abfa786752135296fa5
record_format Article
spelling doaj-79a2d0d9ca5d4abfa786752135296fa52020-11-25T03:50:06ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/88260388826038BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural NetworksBaskoro A. Pratomo0Pete Burnap1George Theodorakopoulos2School of Computer Science and Informatics, Cardiff University, Cardiff, UKSchool of Computer Science and Informatics, Cardiff University, Cardiff, UKSchool of Computer Science and Informatics, Cardiff University, Cardiff, UKDetecting exploits is crucial since the effect of undetected ones can be devastating. Identifying their presence on the network allows us to respond and block their malicious payload before they cause damage to the system. Inspecting the payload of network traffic may offer better performance in detecting exploits as they tend to hide their presence and behave similarly to legitimate traffic. Previous works on deep packet inspection for detecting malicious traffic regularly read the full length of application layer messages. As the length varies, longer messages will take more time to analyse, during which time the attack creates a disruptive impact on the system. Hence, we propose a novel early exploit detection mechanism that scans network traffic, reading only 35.21% of application layer messages to predict malicious traffic while retaining a 97.57% detection rate and a 1.93% false positive rate. Our recurrent neural network- (RNN-) based model is the first work to our knowledge that provides early prediction of malicious application layer messages, thus detecting a potential attack earlier than other state-of-the-art approaches and enabling a form of early warning system.http://dx.doi.org/10.1155/2020/8826038
collection DOAJ
language English
format Article
sources DOAJ
author Baskoro A. Pratomo
Pete Burnap
George Theodorakopoulos
spellingShingle Baskoro A. Pratomo
Pete Burnap
George Theodorakopoulos
BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks
Security and Communication Networks
author_facet Baskoro A. Pratomo
Pete Burnap
George Theodorakopoulos
author_sort Baskoro A. Pratomo
title BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks
title_short BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks
title_full BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks
title_fullStr BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks
title_full_unstemmed BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks
title_sort blatta: early exploit detection on network traffic with recurrent neural networks
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2020-01-01
description Detecting exploits is crucial since the effect of undetected ones can be devastating. Identifying their presence on the network allows us to respond and block their malicious payload before they cause damage to the system. Inspecting the payload of network traffic may offer better performance in detecting exploits as they tend to hide their presence and behave similarly to legitimate traffic. Previous works on deep packet inspection for detecting malicious traffic regularly read the full length of application layer messages. As the length varies, longer messages will take more time to analyse, during which time the attack creates a disruptive impact on the system. Hence, we propose a novel early exploit detection mechanism that scans network traffic, reading only 35.21% of application layer messages to predict malicious traffic while retaining a 97.57% detection rate and a 1.93% false positive rate. Our recurrent neural network- (RNN-) based model is the first work to our knowledge that provides early prediction of malicious application layer messages, thus detecting a potential attack earlier than other state-of-the-art approaches and enabling a form of early warning system.
url http://dx.doi.org/10.1155/2020/8826038
work_keys_str_mv AT baskoroapratomo blattaearlyexploitdetectiononnetworktrafficwithrecurrentneuralnetworks
AT peteburnap blattaearlyexploitdetectiononnetworktrafficwithrecurrentneuralnetworks
AT georgetheodorakopoulos blattaearlyexploitdetectiononnetworktrafficwithrecurrentneuralnetworks
_version_ 1715107299658301440