Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2024, Vol. 18 Issue (1) : 181809    https://doi.org/10.1007/s11704-023-2386-4
Information Security
MMCo: using multimodal deep learning to detect malicious traffic with noisy labels
Qingjun YUAN1, Gaopeng GOU2, Yuefei ZHU1, Yongjuan WANG1()
1. Strategic Support Force Information Engineering University, Zhengzhou 450001, China
2. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
 Download: PDF(1786 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Corresponding Author(s): Yongjuan WANG   
About author: * Both are co-first authors.
Just Accepted Date: 11 April 2023   Issue Date: 16 June 2023
 Cite this article:   
Qingjun YUAN,Gaopeng GOU,Yuefei ZHU, et al. MMCo: using multimodal deep learning to detect malicious traffic with noisy labels[J]. Front. Comput. Sci., 2024, 18(1): 181809.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-023-2386-4
https://academic.hep.com.cn/fcs/EN/Y2024/V18/I1/181809
Fig.1  Architecture of MMCo
  
Fig.2  Disagreement of networks (Sym-20%)
Fig.3  Accuracy on validation set (Sym-20%)
Acc(%) Asym. Sym.
20% 50% 70% 20% 40%
Co-teaching 83.13 81.17 73.55 83.61 73.11
Co-teaching+ 80.49 79.47 71.88 79.89 72.83
Co-learning 80.24 80.11 74.71 80.35 75.54
MMCo (ours) 92.89 90.76 85.31 92.86 81.31
Tab.1  Accuracy under different noise scenarios
1 X, Sun S, Ma Y, Li D, Wang Z, Li N, Wang G Gui . Enhanced echo-state restricted Boltzmann machines for network traffic prediction. IEEE Internet of Things Journal, 2020, 7( 2): 1287–1297
2 S I, Popoola R, Ande B, Adebisi G, Gui M, Hammoudeh O Jogunola . Federated deep learning for zero-day botnet attack detection in IoT-edge devices. IEEE Internet of Things Journal, 2022, 9( 5): 3930–3944
3 M, Ring S, Wunderlich D, Scheuring D, Landes A Hotho . A survey of network-based intrusion detection data sets. Computers & Security, 2019, 86: 147–167
4 B, Han Q, Yao X, Yu G, Niu M, Xu W, Hu I W, Tsang M Sugiyama . Co-teaching: robust training of deep neural networks with extremely noisy labels. In: Proceedings of the 32nd International Conference on Neural Information Processing Systems. 2018, 8536−8546
5 X, Yu B, Han J, Yao G, Niu I W, Tsang M Sugiyama . How does disagreement help generalization against label corruption? In: Proceedings of the 36th International Conference on Machine Learning. 2019, 7164−7173
6 C, Tan J, Xia L, Wu S Z Li . Co-learning: learning from noisy labels with self-supervision. In: Proceedings of the 29th ACM International Conference on Multimedia. 2021, 1405−1413
7 Aceto G, Ciuonzo D, Montieri A, Pescapé A. DISTILLER: encrypted traffic classification via multimodal multitask deep learning. Journal of Network and Computer Applications, 2021, 183−184: 102985
8 A, Nascita A, Montieri G, Aceto D, Ciuonzo V, Persico A Pescapé . XAI meets mobile traffic classification: understanding and improving multimodal deep learning architectures. IEEE Transactions on Network and Service Management, 2021, 18( 4): 4225–4246
9 I, Sharafaldin A H, Lashkari A A Ghorbani . Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy. 2018, 108−116
10 M, MontazeriShatoori L, Davidson G, Kaur A H Lashkari . Detection of DoH tunnels using time-series classification of encrypted traffic. In: Proceedings of the 5th Cyber Science and Technology Congress. 2020, 63−70
[1] FCS-22386-OF-QY_suppl_1 Download
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed