| CPC H04L 63/1425 (2013.01) [H04L 41/16 (2013.01); H04L 63/1466 (2013.01)] | 20 Claims |

|
1. A method comprising:
perturbing a first plurality of protocol data units (PDUs) to generate a second plurality of PDUs, wherein perturbing the first plurality of PDUs comprises,
removing low importance fields of PDUs in the first plurality of PDUs; and
at least one of reordering fields of PDUs in the first plurality of PDUs, randomly replacing values of fields of PDUs in the first plurality of PDUs, and iteratively replacing values of a subset of fields in the first plurality of PDUs with values in lists of known values for the subset of fields; and
training one or more machine learning models to detect malicious network traffic with the second plurality of PDUs, wherein the second plurality of PDUs have been labeled to indicate whether each of the second plurality of PDUs corresponds to known malicious or benign network traffic.
|