Table of Content

Open Access


Using Object Detection Network for Malware Detection and Identification in Network Traffic Packets

Chunlai Du1, Shenghui Liu1, Lei Si2, Yanhui Guo2, *, Tong Jin1
1 School of Information Science and Technology, North China University of Technology, Beijing, 100144, China.
2 Department of Computer Science, University of Illinois Springfield, Springfield, USA.
* Corresponding Author: Yanhui Guo. Email: .

Computers, Materials & Continua 2020, 64(3), 1785-1796.

Received 10 February 2020; Accepted 24 April 2020; Issue published 30 June 2020


In recent years, the number of exposed vulnerabilities has grown rapidly and more and more attacks occurred to intrude on the target computers using these vulnerabilities such as different malware. Malware detection has attracted more attention and still faces severe challenges. As malware detection based traditional machine learning relies on exports’ experience to design efficient features to distinguish different malware, it causes bottleneck on feature engineer and is also time-consuming to find efficient features. Due to its promising ability in automatically proposing and selecting significant features, deep learning has gradually become a research hotspot. In this paper, aiming to detect the malicious payload and identify their categories with high accuracy, we proposed a packet-based malicious payload detection and identification algorithm based on object detection deep learning network. A dataset of malicious payload on code execution vulnerability has been constructed under the Metasploit framework and used to evaluate the performance of the proposed malware detection and identification algorithm. The experimental results demonstrated that the proposed object detection network can efficiently find and identify malicious payloads with high accuracy.


Intrusion detection, malicious payload, deep learning, object detection network.

Cite This Article

C. Du, S. Liu, L. Si, Y. Guo and T. Jin, "Using object detection network for malware detection and identification in network traffic packets," Computers, Materials & Continua, vol. 64, no.3, pp. 1785–1796, 2020.


This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1814


  • 1447


  • 0


Share Link

WeChat scan