Effect Analysis of Malicious Flow Classification Model Based on Representation Learning on Network Flow Anomaly Detection

Authors

  • Yan Hu College of Intelligent Transportation, Hunan Communication Polytechnic, Changsha, 410132, China; Department of Common Courses, Hunan Communication Polytechnic, Changsha, 410132, China
  • Xiaole Duan Teaching Department of Public Courses, Hunan Communication Polytechnic, Changsha, 410132, China
  • Yuan Chen College of Intelligent Transportation, Hunan Communication Polytechnic, Changsha, 410132, China; Department of Common Courses, Hunan Communication Polytechnic, Changsha, 410132, China
  • Zhu Zhao College of Intelligent Transportation, Hunan Communication Polytechnic, Changsha, 410132, China; Department of Common Courses, Hunan Communication Polytechnic, Changsha, 410132, China

DOI:

https://doi.org/10.5755/j01.itc.53.3.34856

Keywords:

RL, Abnormal detection, Flow classification, Convolution neural network

Abstract

Network traffic anomaly detection, as a key link of network security, has been paid more and more attention in recent years. Aiming at abnormal flow caused by improper network usage, this paper proposes a network flow anomaly detection model using representation learning. In this model, the study treats raw flow data as images directly through representation learning, and then classifies malicious flow by performing image classification tasks. The study is tested using the USTC-TFC2016 dataset. The experimental results show that the model exhibits excellent classification accuracy of 0.9990 both in the characterization of flow sessions and total flow, and PR and F1 values are all above 0.9907. In addition, the classification accuracy of the three classifiers for flow data is more than 98%, and the classification accuracy of normal flow and malicious flow is 100%. The experimental results show that the proposed method meets the needs of practical applications and has excellent classification performance. This provides a new research angle and direction for network flow anomaly detection.

Downloads

Published

2024-09-25

Issue

Section

Articles