Network Intrusion Detection Based on Self-Attention Mechanism and BIGRU

被引:0
作者
Du, Xuran [1 ]
Gan, Gang [1 ]
机构
[1] Chengdu Univ Informat Technol, Cyberspace Secur Acad, Chengdu, Peoples R China
来源
2024 2ND INTERNATIONAL CONFERENCE ON MOBILE INTERNET, CLOUD COMPUTING AND INFORMATION SECURITY, MICCIS 2024 | 2024年
关键词
Network Intrusion Detection; Data Set Balancing Process; Self-Attention Mechanism; Bi-directional Gated Loop Unit;
D O I
10.1109/MICCIS63508.2024.00045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Maintaining network security is crucial, and network intrusion detection systems perform an essential utility in detecting malicious network attacks. Machine learning and deep learning techniques are broadly employed in network intrusion detection to enhance the precision of NIDS. However, the benchmark dataset applied to intrusion detection often has a significantly more significant quantity of standard traffic samples than attack traffic samples, which can negatively impact the model's accuracy. To tackle this challenge, this paper presents a proposed solution that combines the Adaptive Synthetic Sampling Method and the Tomek-Links algorithm to resample the training data and balance the dataset. Additionally, the paper suggests using a Self-Attention Mechanism and Bidirectional Gated Recurrent Unit network for intrusion detection, with different models utilized for experimental comparison. The proposed model's experimental results on the NSL-KDD benchmark dataset demonstrate a significant improvement in accuracy. The model achieved 91.4% accuracy for the two-classification task and 82.8% for the five-classification task, higher than the comparison experimental model. These results confirm that the method effectively improves network intrusion detection accuracy.
引用
收藏
页码:236 / 241
页数:6
相关论文
共 24 条
[21]  
Wang X., 2019, Computer Engineering
[22]   Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion Detection [J].
Xiao, Liyuan ;
Chen, Yetian ;
Chang, Carl K. .
2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, :128-133
[23]   Model of the intrusion detection system based on the integration of spatial-temporal features [J].
Zhang, Jianwu ;
Ling, Yu ;
Fu, Xingbing ;
Yang, Xiongkun ;
Xiong, Gang ;
Zhang, Rui .
COMPUTERS & SECURITY, 2020, 89
[24]  
Zhang Y, 2018, Journal of Computer Research and Development