JOURNAL ARTICLE

Research on malicious Program Traffic Detection Technology based on Deep Learning

Feng LiJianye ZhangBizhou HeBin WangShuting Chen

Year: 2021 Journal:   2021 IEEE 2nd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA) Pages: 762-765

Abstract

With the implementation of the strategy of "three types and two networks", there are network security risks in every link of the power system, which is mainly reflected in the fact that the power information system has a large user base and large exposure, and at the same time stores a large amount of electricity customer data. bearing control business, once the system is breached, it will have a great impact on the society and economy. However, the network attack on power information system has the characteristics of "strong professionalism, deep latency, long persistence and great destructiveness", so the security monitoring of power network and information system is faced with great challenges. Attackers generally use malicious programs to steal sensitive information, but with the progress of various intrusion detection technologies, malicious program anti-detection technology is also developing, which makes malicious program traffic very hidden and more difficult to be detected. Based on the shallow machine learning method, the ability to describe the characteristics of malicious programs is insufficient, and in the face of new malicious programs, such as inefficiency or failure, deep learning technology shows a strong learning ability in many application fields. this paper explores the research and application of malicious program traffic monitoring technology based on deep learning method. This paper studies the monitoring of abnormal traffic access behavior of malicious programs based on deep learning, and perceives abnormal traffic and security threats in real time.

Keywords:
Computer science Deep learning Computer security Artificial intelligence Computer network

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
18
Refs
0.21
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.