In this paper, we present the results obtained by applying deep learning techniques to classification of network protocols and applications using flow features and data signatures. We also present a similar classification of malware using their binary files. We use our own dataset for traffic identification and Microsoft Kaggle dataset for malware classification tasks. The current techniques used in network traffic analysis and malware detection is time consuming and beatable as the precise signatures are known. Deep learned features in both cases are not hand crafted and are learned form data signatures. It cannot be understood by the attacker or the malware in order to fake or hide it and hence cannot be bypassed easily. © 2017, Springer Nature Singapore Pte Ltd.
cited By 0; Conference of 5th International Symposium on Security in Computing and Communications, SSCC 2017 ; Conference Date: 13 September 2017 Through 16 September 2017; Conference Code:204689
R. K. Rahul, Anjali, T., Menon, V. K., and Soman, K. P., “Deep Learning for Network Flow Analysis and Malware Classification”, Communications in Computer and Information Science, vol. 746, pp. 226-235, 2017.