Yan Cao , Xuanren Qu , Yu Wang , Tianrui Li , Jiabin Li
{"title":"Detection of intranet scanning traffic and tool detection based on multi-feature fusion","authors":"Yan Cao , Xuanren Qu , Yu Wang , Tianrui Li , Jiabin Li","doi":"10.1016/j.jisa.2025.104051","DOIUrl":null,"url":null,"abstract":"<div><div>Network port scanning is a crucial information gathering technique that precedes various types of cyberattacks, and it poses a primary challenge in the network defense process. Detecting port scanning traffic and identifying the types of scanning tools used can help security personnel discover unknown scanning activities, understand the attackers’ intentions, and implement targeted defenses. This paper proposes a multi-feature fusion-based scanning tool identification method, MUST, to address this challenge. First, the core data packets within each network session are extracted and transformed into Traffic Graphs (TGs). These TGs represent the communication behavior of the sessions through their shape and color characteristics. Then, the sliding window and window attention mechanisms of the Swin Transformer model are employed to extract Traffic Graph Features (TGFs) from the TGs. MUST leverages a deep fusion of the typical statistical features of the session traffic and the TGFs to detect intranet scanning traffic and accurately identify the scanning tool types. Comparative evaluations show that the multi-feature fusion approach of MUST effectively distinguishes different scanning tool traffic and achieves superior detection accuracy across various scenarios. Moreover, MUST demonstrates robust detection performance for unknown scanning activities, with accuracy and recall rates exceeding 0.97 on the CICIDS2017 and InSDN dataset.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104051"},"PeriodicalIF":3.8000,"publicationDate":"2025-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625000882","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Network port scanning is a crucial information gathering technique that precedes various types of cyberattacks, and it poses a primary challenge in the network defense process. Detecting port scanning traffic and identifying the types of scanning tools used can help security personnel discover unknown scanning activities, understand the attackers’ intentions, and implement targeted defenses. This paper proposes a multi-feature fusion-based scanning tool identification method, MUST, to address this challenge. First, the core data packets within each network session are extracted and transformed into Traffic Graphs (TGs). These TGs represent the communication behavior of the sessions through their shape and color characteristics. Then, the sliding window and window attention mechanisms of the Swin Transformer model are employed to extract Traffic Graph Features (TGFs) from the TGs. MUST leverages a deep fusion of the typical statistical features of the session traffic and the TGFs to detect intranet scanning traffic and accurately identify the scanning tool types. Comparative evaluations show that the multi-feature fusion approach of MUST effectively distinguishes different scanning tool traffic and achieves superior detection accuracy across various scenarios. Moreover, MUST demonstrates robust detection performance for unknown scanning activities, with accuracy and recall rates exceeding 0.97 on the CICIDS2017 and InSDN dataset.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.