Intrusion Detection System Based on ViTCycleGAN and Rules

被引:0
|
作者
Fang, Menghao [1 ]
Li, Xia [2 ]
Wang, Yuanyuan [3 ]
Wang, Qiuxuan [4 ]
Sun, Xinlei [5 ]
Zhang, Shuo [2 ]
机构
[1] Univ Int Relat, Sch Cyber Sci & Engn, Beijing 100091, Peoples R China
[2] Dalian Maritime Univ, Marine Engn Coll, Dalian 116026, Liaoning, Peoples R China
[3] Anyang Normal Univ, Sch Math & Stat, Anyang 455099, Peoples R China
[4] Dalian Maritime Univ, Nav Coll, Dalian 116026, Liaoning, Peoples R China
[5] Dalian Maritime Univ, Informat Sci & Technol Coll, Dalian 116026, Liaoning, Peoples R China
关键词
Deep Learning; Intrusion Detection; Neural Network; Information Security;
D O I
10.1007/978-981-97-5588-2_18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper explores the application of deep learning techniques in the field of intrusion detection and its potential problems. Possible challenges of deep learning in intrusion detection include handling the imbalance between positive and negative samples, which leads to unstable model performance in distinguishing normal and abnormal traffic. To address this issue, the paper proposes combining deep learning-based intrusion detection techniques with a rule-based approach to enhance the system's adaptability and intelligence. The specific scheme includes four Vision Transformer models, two generators, and two discriminators. The discriminators are used to differentiate normal traffic and detect abnormal behaviors, following strict detection rules to reach a final determination. Through validation on the NSL-KDD dataset and CIC-DDOS2019 dataset, the proposed scheme achieves accuracies of 98.32% and 99.23%, respectively, providing new research insights and solutions in the field of intrusion detection.
引用
收藏
页码:203 / 214
页数:12
相关论文
共 50 条
  • [1] Distributed intrusion detection system based on fuzzy rules
    Qiao, Peili
    Su, Jie
    Liu, Yahui
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
  • [2] Intrusion Detection System Based on Evolving Rules for Wireless Sensor Networks
    Lu, Nannan
    Sun, Yanjing
    Liu, Hui
    Li, Song
    JOURNAL OF SENSORS, 2018, 2018
  • [3] An Intrusion Detection Approach Based on System Call Sequences and Rules Extraction
    Ye Qing
    Wu Xiaoping
    Yan Bo
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 14 - 17
  • [4] Improving Intrusion Detection System Based on Snort Rules for Network Probe Attack Detection
    Khamphakdee, Nattawat
    Benjamas, Nunnapus
    Saiyod, Saiyan
    2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2014,
  • [5] Detection model of network abnormity based on fuzzy association rules for intrusion detection system
    Peng, XG
    Mai, YL
    Liu, YS
    Wu, YS
    ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 4858 - 4861
  • [6] A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models
    Ahmim, Ahmed
    Maglaras, Leandros
    Ferrag, Mohamed Amine
    Derdour, Makhlouf
    Janicke, Helge
    2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, : 228 - 233
  • [7] Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining
    Khamphakdee, Nattawat
    Benjamas, Nunnapus
    Saiyod, Saiyan
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2015, 8 (03) : 234 - 250
  • [8] Research of Intrusion Detection Technology Based on Association Rules
    Zhangbo
    FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878
  • [9] Applying mining fuzzy association rules to intrusion detection based on sequences of system calls
    Zhang, GL
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 826 - 835
  • [10] Comparison of the Intrusion Detection System Rules in Relation with the SCADA Systems
    Vavra, Jan
    Hromada, Martin
    SOFTWARE ENGINEERING PERSPECTIVES AND APPLICATION IN INTELLIGENT SYSTEMS, VOL 2, 2016, 465 : 159 - 169