SlideShare a Scribd company logo
1 of 13
Evaluating Shallow and Deep Networks
for Secure Shell (SSH)Traffic Analysis
Vinayakumar R1, K.P Soman1 and Prabaharan Poornachandran2
1Centre for Computational Engineering and Networking (CEN), Amrita School of
Engineering, Coimbatore, Amrita Vishwa Vidyapeetham,
Amrita University, India.
2Center for Cyber Security Systems and Networks, Amrita School of Engineering,
Amritapuri, Amrita Vishwa Vidyapeetham,
Amrita University, India.
Outline
• Introduction
• Methodology
• Description of the data set and Results
• Summary
• Future Work
• References
2
Introduction
• Traffic classification serves as a primary
mechanism for numerous network
management activities counting from knowing
simple network statistics to quality of service
provisioning.
• Most commonly used methods are port
based, payload based and flow features
statistics.
3
Methodology
• Flow feature statistics such as protocol, minimum
packet length (f&b), minimum inter-arival time
(f&b), duration mean packet length (f&b), mean
inter-arival time (f&b), total packets (f&b),
maximum packet length (f&b), maximum inter-
arival time (f&b), total bytes (f&b), standad
deviation of packet lengths (f&b), standad
deviation of inter-arival times (f&b) are passed to
machine learning and deep learning algorithms
such as recurrent neural networks (RNN) and long
short-term memory (LSTM).
4
Contd.
Figure 1. Proposed LSTM Architecture
5
Description of the data set and Results
Public traces are from the NLANRs (National Laboratory for Applied
Network Research) Active Measurement Project (AMP) [1] and
Measurement and Analysis on the WIDE Internet (MAWI) [2] and
DARPA Week 1 and Week 3 [5]. Private trace is from Network
Information Management and Security Group (NIMS) [3], [4].
Table 1. Description of Data set
6
Results
Table 2. Summary of test results with training data set NIMS and
testing data set AMP, MAWI, DARPA week 1, DARPA week 3
7
Contd.
Table 3. Summary of test results with training data set AMP,
MAWI, DARPA week 1, DARPA week 3 and testing data set NIMS
8
Contd.
Table 4. Summary of test results in classifying background
applications running over SSH and NON-SSH using machine
learning
9
Contd.
Table 5. Summary of test results in classifying services and
background traffics running over of SSH and NON-SSH using
deep learning
10
Summary
• The performance of machine learning and deep
learning approaches are evaluated on classifying SSH.
• To know how machine learning and deep learning
works on completely unseen data, we have trained
both machine learning and deep learning approaches
on public traces such as AMP, MAWI, DARPA Week 1
and DARPA week 3 and the performance of them is
evaluated on private trace such as NIMS and vice versa.
• Deep learning algorithms performed well in
comparison to the machine learning algorithms in all
the experimental settings.
11
Future Work
• The internet and its applications mainly peer-
2-peer (P2P), voice over internet protocol
(VOIP), multi-media are following constant
transformation. Thus, the patterns of traffic
are very dynamic. Thus the proposed
technique can be applied on the recently
released data set.
12
References
[1] “Nlanr,” available at http://pma.nlanr.net/special.
[2] “Mawi,” available at http://tracer.csl.sony.co.jp/mawi/.
[3] R. Alshammari and A. N. Zincir-Heywood, “A flow based
approach for ssh traffic detection,” in Systems, Man and
Cybernetics, 2007. ISIC. IEEE International Conference on.
IEEE, 2007, pp. 296–301.
[4] “Can encrypted traffic be identified without port numbers,
ip addresses and payload inspection?” Computer networks,
vol. 55, no. 6, pp. 1326–1350, 2011
[5] L. Didaci, G. Giacinto, and F. Roli, “Ensemble learning for
intrusion detection in computer networks,” in Workshop
Machine Learning Methods Applications, Siena, Italy, 2002
13

More Related Content

What's hot

APM project meeting - June 13, 2012 - LBNL, Berkeley, CA
APM project meeting - June 13, 2012 - LBNL, Berkeley, CAAPM project meeting - June 13, 2012 - LBNL, Berkeley, CA
APM project meeting - June 13, 2012 - LBNL, Berkeley, CAbalmanme
 
Evaluation of CSSR with Direct TCH Assignment in Cellular Networks
Evaluation of CSSR with Direct TCH Assignment in Cellular NetworksEvaluation of CSSR with Direct TCH Assignment in Cellular Networks
Evaluation of CSSR with Direct TCH Assignment in Cellular NetworksIJERA Editor
 
1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over lte1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over ltetanawan44
 
Analysis of LTE Radio Load and User Throughput
Analysis of LTE Radio Load and User ThroughputAnalysis of LTE Radio Load and User Throughput
Analysis of LTE Radio Load and User ThroughputIJCNCJournal
 
Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficTELKOMNIKA JOURNAL
 
1705.01235
1705.012351705.01235
1705.01235Faw Yas
 
Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
 
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
S URVEY OF  L TE  D OWNLINK  S CHEDULERS A LGORITHMS IN  O PEN  A CCESS  S IM...S URVEY OF  L TE  D OWNLINK  S CHEDULERS A LGORITHMS IN  O PEN  A CCESS  S IM...
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...ijwmn
 
Routing in Networks using Genetic Algorithm
Routing in Networks using Genetic AlgorithmRouting in Networks using Genetic Algorithm
Routing in Networks using Genetic AlgorithmjournalBEEI
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
 
Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...
Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...
Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...IJECEIAES
 
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...Eswar Publications
 
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...IJECEIAES
 
Open-Source Based Prototype for Quality of Service (QoS) Monitoring and Quali...
Open-Source Based Prototype for Quality of Service (QoS) Monitoring and Quali...Open-Source Based Prototype for Quality of Service (QoS) Monitoring and Quali...
Open-Source Based Prototype for Quality of Service (QoS) Monitoring and Quali...Sebastian Schumann
 
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...IJMER
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTESpiros Louvros
 
Comparative analysis of the performance of various active queue management te...
Comparative analysis of the performance of various active queue management te...Comparative analysis of the performance of various active queue management te...
Comparative analysis of the performance of various active queue management te...IJECEIAES
 

What's hot (19)

APM project meeting - June 13, 2012 - LBNL, Berkeley, CA
APM project meeting - June 13, 2012 - LBNL, Berkeley, CAAPM project meeting - June 13, 2012 - LBNL, Berkeley, CA
APM project meeting - June 13, 2012 - LBNL, Berkeley, CA
 
Evaluation of CSSR with Direct TCH Assignment in Cellular Networks
Evaluation of CSSR with Direct TCH Assignment in Cellular NetworksEvaluation of CSSR with Direct TCH Assignment in Cellular Networks
Evaluation of CSSR with Direct TCH Assignment in Cellular Networks
 
I1102014953
I1102014953I1102014953
I1102014953
 
1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over lte1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over lte
 
Analysis of LTE Radio Load and User Throughput
Analysis of LTE Radio Load and User ThroughputAnalysis of LTE Radio Load and User Throughput
Analysis of LTE Radio Load and User Throughput
 
Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network traffic
 
1705.01235
1705.012351705.01235
1705.01235
 
4 gstudy
4 gstudy4 gstudy
4 gstudy
 
Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...
 
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
S URVEY OF  L TE  D OWNLINK  S CHEDULERS A LGORITHMS IN  O PEN  A CCESS  S IM...S URVEY OF  L TE  D OWNLINK  S CHEDULERS A LGORITHMS IN  O PEN  A CCESS  S IM...
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
 
Routing in Networks using Genetic Algorithm
Routing in Networks using Genetic AlgorithmRouting in Networks using Genetic Algorithm
Routing in Networks using Genetic Algorithm
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
 
Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...
Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...
Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...
 
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
 
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
 
Open-Source Based Prototype for Quality of Service (QoS) Monitoring and Quali...
Open-Source Based Prototype for Quality of Service (QoS) Monitoring and Quali...Open-Source Based Prototype for Quality of Service (QoS) Monitoring and Quali...
Open-Source Based Prototype for Quality of Service (QoS) Monitoring and Quali...
 
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTE
 
Comparative analysis of the performance of various active queue management te...
Comparative analysis of the performance of various active queue management te...Comparative analysis of the performance of various active queue management te...
Comparative analysis of the performance of various active queue management te...
 

Similar to Icacci presentation-ssh traffic

Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17redpel dot com
 
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)CSCJournals
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNIJARIIT
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
 
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...SyafiqahMohamad84
 
G03403041052
G03403041052G03403041052
G03403041052theijes
 
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless NetworksThe Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless NetworksIRJET Journal
 
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless NetworksThe Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless NetworksIRJET Journal
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfJessica Thompson
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetGyan Prakash
 
Choosing the best quality of service algorithm using OPNET simulation
Choosing the best quality of service algorithm using OPNET  simulationChoosing the best quality of service algorithm using OPNET  simulation
Choosing the best quality of service algorithm using OPNET simulationIJECEIAES
 
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEPerformance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEIRJET Journal
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection finalAkshay Bansal
 
Performance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANETPerformance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANETjannahyusoff1
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...IRJET Journal
 
NWCRG-IAB-Review-IETF91.pdf
NWCRG-IAB-Review-IETF91.pdfNWCRG-IAB-Review-IETF91.pdf
NWCRG-IAB-Review-IETF91.pdfssuserf127b8
 
An Architecture For Mobility Management In Mobile Computing Networks
An Architecture For Mobility Management In Mobile Computing NetworksAn Architecture For Mobility Management In Mobile Computing Networks
An Architecture For Mobility Management In Mobile Computing NetworksJim Jimenez
 

Similar to Icacci presentation-ssh traffic (20)

Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
 
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSN
 
H0444146
H0444146H0444146
H0444146
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
 
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
 
G03403041052
G03403041052G03403041052
G03403041052
 
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless NetworksThe Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
 
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless NetworksThe Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes Net
 
Choosing the best quality of service algorithm using OPNET simulation
Choosing the best quality of service algorithm using OPNET  simulationChoosing the best quality of service algorithm using OPNET  simulation
Choosing the best quality of service algorithm using OPNET simulation
 
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEPerformance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection final
 
Performance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANETPerformance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANET
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
 
A044030110
A044030110A044030110
A044030110
 
NWCRG-IAB-Review-IETF91.pdf
NWCRG-IAB-Review-IETF91.pdfNWCRG-IAB-Review-IETF91.pdf
NWCRG-IAB-Review-IETF91.pdf
 
An Architecture For Mobility Management In Mobile Computing Networks
An Architecture For Mobility Management In Mobile Computing NetworksAn Architecture For Mobility Management In Mobile Computing Networks
An Architecture For Mobility Management In Mobile Computing Networks
 

More from vinaykumar R

Ista presentation-dga
Ista presentation-dgaIsta presentation-dga
Ista presentation-dgavinaykumar R
 
Ista presentation-android
Ista presentation-androidIsta presentation-android
Ista presentation-androidvinaykumar R
 
Ista presentation-ecg
Ista presentation-ecgIsta presentation-ecg
Ista presentation-ecgvinaykumar R
 
Ista presentation-malicious url
Ista presentation-malicious urlIsta presentation-malicious url
Ista presentation-malicious urlvinaykumar R
 
Ista presentation-apache spark
Ista presentation-apache sparkIsta presentation-apache spark
Ista presentation-apache sparkvinaykumar R
 
Icacci presentation-intrusion
Icacci presentation-intrusionIcacci presentation-intrusion
Icacci presentation-intrusionvinaykumar R
 
Icacci presentation-cnn intrusion
Icacci presentation-cnn intrusionIcacci presentation-cnn intrusion
Icacci presentation-cnn intrusionvinaykumar R
 
Icacci presentation-isi-text categorization
Icacci presentation-isi-text categorizationIcacci presentation-isi-text categorization
Icacci presentation-isi-text categorizationvinaykumar R
 
Icacci presentation-isi-ransomware
Icacci presentation-isi-ransomwareIcacci presentation-isi-ransomware
Icacci presentation-isi-ransomwarevinaykumar R
 
Icacci presentation-anomaly
Icacci presentation-anomalyIcacci presentation-anomaly
Icacci presentation-anomalyvinaykumar R
 
Icacci presentation- deep android
Icacci presentation- deep androidIcacci presentation- deep android
Icacci presentation- deep androidvinaykumar R
 
Icacci2017 poster template
Icacci2017 poster templateIcacci2017 poster template
Icacci2017 poster templatevinaykumar R
 

More from vinaykumar R (12)

Ista presentation-dga
Ista presentation-dgaIsta presentation-dga
Ista presentation-dga
 
Ista presentation-android
Ista presentation-androidIsta presentation-android
Ista presentation-android
 
Ista presentation-ecg
Ista presentation-ecgIsta presentation-ecg
Ista presentation-ecg
 
Ista presentation-malicious url
Ista presentation-malicious urlIsta presentation-malicious url
Ista presentation-malicious url
 
Ista presentation-apache spark
Ista presentation-apache sparkIsta presentation-apache spark
Ista presentation-apache spark
 
Icacci presentation-intrusion
Icacci presentation-intrusionIcacci presentation-intrusion
Icacci presentation-intrusion
 
Icacci presentation-cnn intrusion
Icacci presentation-cnn intrusionIcacci presentation-cnn intrusion
Icacci presentation-cnn intrusion
 
Icacci presentation-isi-text categorization
Icacci presentation-isi-text categorizationIcacci presentation-isi-text categorization
Icacci presentation-isi-text categorization
 
Icacci presentation-isi-ransomware
Icacci presentation-isi-ransomwareIcacci presentation-isi-ransomware
Icacci presentation-isi-ransomware
 
Icacci presentation-anomaly
Icacci presentation-anomalyIcacci presentation-anomaly
Icacci presentation-anomaly
 
Icacci presentation- deep android
Icacci presentation- deep androidIcacci presentation- deep android
Icacci presentation- deep android
 
Icacci2017 poster template
Icacci2017 poster templateIcacci2017 poster template
Icacci2017 poster template
 

Recently uploaded

Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 

Icacci presentation-ssh traffic

  • 1. Evaluating Shallow and Deep Networks for Secure Shell (SSH)Traffic Analysis Vinayakumar R1, K.P Soman1 and Prabaharan Poornachandran2 1Centre for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, Amrita University, India. 2Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa Vidyapeetham, Amrita University, India.
  • 2. Outline • Introduction • Methodology • Description of the data set and Results • Summary • Future Work • References 2
  • 3. Introduction • Traffic classification serves as a primary mechanism for numerous network management activities counting from knowing simple network statistics to quality of service provisioning. • Most commonly used methods are port based, payload based and flow features statistics. 3
  • 4. Methodology • Flow feature statistics such as protocol, minimum packet length (f&b), minimum inter-arival time (f&b), duration mean packet length (f&b), mean inter-arival time (f&b), total packets (f&b), maximum packet length (f&b), maximum inter- arival time (f&b), total bytes (f&b), standad deviation of packet lengths (f&b), standad deviation of inter-arival times (f&b) are passed to machine learning and deep learning algorithms such as recurrent neural networks (RNN) and long short-term memory (LSTM). 4
  • 5. Contd. Figure 1. Proposed LSTM Architecture 5
  • 6. Description of the data set and Results Public traces are from the NLANRs (National Laboratory for Applied Network Research) Active Measurement Project (AMP) [1] and Measurement and Analysis on the WIDE Internet (MAWI) [2] and DARPA Week 1 and Week 3 [5]. Private trace is from Network Information Management and Security Group (NIMS) [3], [4]. Table 1. Description of Data set 6
  • 7. Results Table 2. Summary of test results with training data set NIMS and testing data set AMP, MAWI, DARPA week 1, DARPA week 3 7
  • 8. Contd. Table 3. Summary of test results with training data set AMP, MAWI, DARPA week 1, DARPA week 3 and testing data set NIMS 8
  • 9. Contd. Table 4. Summary of test results in classifying background applications running over SSH and NON-SSH using machine learning 9
  • 10. Contd. Table 5. Summary of test results in classifying services and background traffics running over of SSH and NON-SSH using deep learning 10
  • 11. Summary • The performance of machine learning and deep learning approaches are evaluated on classifying SSH. • To know how machine learning and deep learning works on completely unseen data, we have trained both machine learning and deep learning approaches on public traces such as AMP, MAWI, DARPA Week 1 and DARPA week 3 and the performance of them is evaluated on private trace such as NIMS and vice versa. • Deep learning algorithms performed well in comparison to the machine learning algorithms in all the experimental settings. 11
  • 12. Future Work • The internet and its applications mainly peer- 2-peer (P2P), voice over internet protocol (VOIP), multi-media are following constant transformation. Thus, the patterns of traffic are very dynamic. Thus the proposed technique can be applied on the recently released data set. 12
  • 13. References [1] “Nlanr,” available at http://pma.nlanr.net/special. [2] “Mawi,” available at http://tracer.csl.sony.co.jp/mawi/. [3] R. Alshammari and A. N. Zincir-Heywood, “A flow based approach for ssh traffic detection,” in Systems, Man and Cybernetics, 2007. ISIC. IEEE International Conference on. IEEE, 2007, pp. 296–301. [4] “Can encrypted traffic be identified without port numbers, ip addresses and payload inspection?” Computer networks, vol. 55, no. 6, pp. 1326–1350, 2011 [5] L. Didaci, G. Giacinto, and F. Roli, “Ensemble learning for intrusion detection in computer networks,” in Workshop Machine Learning Methods Applications, Siena, Italy, 2002 13