Network Traffic Anomaly Detection Based on Spatiotemporal Feature Extraction and Channel Attention

被引:0
作者
Ji, Changpeng [1 ]
Yu, Haofeng [1 ]
Dai, Wei [1 ]
机构
[1] Liaoning Tech Univ, Sch Elect & Informat Engn, Huludao 125105, Peoples R China
关键词
network security; deep learning; anomaly detection; dilated convolution; GRU; channel attention;
D O I
10.3390/pr12071418
中图分类号
TQ [化学工业];
学科分类号
0817 ;
摘要
To overcome the challenges of feature selection in traditional machine learning and enhance the accuracy of deep learning methods for anomaly traffic detection, we propose a novel method called DCGCANet. This model integrates dilated convolution, a GRU, and a Channel Attention Network, effectively combining dilated convolutional structures with GRUs to extract both temporal and spatial features for identifying anomalous patterns in network traffic. The one-dimensional dilated convolution (DC-1D) structure is designed to expand the receptive field, allowing for comprehensive traffic feature extraction while minimizing information loss typically caused by pooling operations. The DC structure captures spatial dependencies in the data, while the GRU processes time series data to capture dynamic traffic changes. Furthermore, the channel attention (CA) module assigns importance-based weights to features in different channels, enhancing the model's representational capacity and improving its ability to detect abnormal traffic. DCGCANet achieved an accuracy rate of 99.6% on the CIC-IDS-2017 dataset, outperforming other algorithms. Additionally, the model attained precision, recall, and F1 score rates of 99%. The generalization capability of DCGCANet was validated on a subset of CIC-IDS-2017, demonstrating superior detection performance and robust generalization potential.
引用
收藏
页数:19
相关论文
共 20 条
[1]  
[Anonymous], 1980, COMPUTER SECURITY TH
[2]  
Chen J, 2021, Inf. Technol. Netw. Secur, V40, P42
[3]  
Gao S.G., 2020, Inf. Technol. Netw. Secur, V39, P8
[4]   An effective intrusion detection approach using SVM with naive Bayes feature embedding [J].
Gu, Jie ;
Lu, Shan .
COMPUTERS & SECURITY, 2021, 103
[5]   An effective genetic algorithm-based feature selection method for intrusion detection systems [J].
Halim, Zahid ;
Yousaf, Muhammad Nadeem ;
Waqas, Muhammad ;
Sulaiman, Muhammad ;
Abbas, Ghulam ;
Hussain, Masroor ;
Ahmad, Iftekhar ;
Hanif, Muhammad .
COMPUTERS & SECURITY, 2021, 110
[6]  
Hang mengxin, 2021, Journal of Computer Applications, P433, DOI 10.11772/j.issn.1001-9081.2020050734
[7]  
Ji C.P., 2024, P 4 IFSA WINT C AUT, P90
[8]   Analysis of ResNet and GoogleNet models for malware detection [J].
Khan, Riaz Ullah ;
Zhang, Xiaosong ;
Kumar, Rajesh .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2019, 15 (01) :29-37
[9]   Hybrid Dilated Convolution with Multi-Scale Residual Fusion Network for Hyperspectral Image Classification [J].
Li, Chenming ;
Qiu, Zelin ;
Cao, Xueying ;
Chen, Zhonghao ;
Gao, Hongmin ;
Hua, Zaijun .
MICROMACHINES, 2021, 12 (05)
[10]  
Li Y., 2020, COMPUT APPL SOFTW, V37, P324