Intrusion Detection System Based on ViTCycleGAN and Rules

被引:0
作者
Fang, Menghao [1 ]
Li, Xia [2 ]
Wang, Yuanyuan [3 ]
Wang, Qiuxuan [4 ]
Sun, Xinlei [5 ]
Zhang, Shuo [2 ]
机构
[1] Univ Int Relat, Sch Cyber Sci & Engn, Beijing 100091, Peoples R China
[2] Dalian Maritime Univ, Marine Engn Coll, Dalian 116026, Liaoning, Peoples R China
[3] Anyang Normal Univ, Sch Math & Stat, Anyang 455099, Peoples R China
[4] Dalian Maritime Univ, Nav Coll, Dalian 116026, Liaoning, Peoples R China
[5] Dalian Maritime Univ, Informat Sci & Technol Coll, Dalian 116026, Liaoning, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT III, ICIC 2024 | 2024年 / 14864卷
关键词
Deep Learning; Intrusion Detection; Neural Network; Information Security;
D O I
10.1007/978-981-97-5588-2_18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper explores the application of deep learning techniques in the field of intrusion detection and its potential problems. Possible challenges of deep learning in intrusion detection include handling the imbalance between positive and negative samples, which leads to unstable model performance in distinguishing normal and abnormal traffic. To address this issue, the paper proposes combining deep learning-based intrusion detection techniques with a rule-based approach to enhance the system's adaptability and intelligence. The specific scheme includes four Vision Transformer models, two generators, and two discriminators. The discriminators are used to differentiate normal traffic and detect abnormal behaviors, following strict detection rules to reach a final determination. Through validation on the NSL-KDD dataset and CIC-DDOS2019 dataset, the proposed scheme achieves accuracies of 98.32% and 99.23%, respectively, providing new research insights and solutions in the field of intrusion detection.
引用
收藏
页码:203 / 214
页数:12
相关论文
共 14 条
[11]   Counselors network for intrusion detection [J].
Quincozes, Silvio E. ;
Raniery, Carlos ;
Nunes, Raul Ceretta ;
Albuquerque, Celio ;
Passos, Diego ;
Mosse, Daniel .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (03)
[12]   Intrusion detection using reduced-size RNN based on feature grouping [J].
Sheikhan, Mansour ;
Jadidi, Zahra ;
Farrokhi, Ali .
NEURAL COMPUTING & APPLICATIONS, 2012, 21 (06) :1185-1190
[13]  
unb, About us
[14]   Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks [J].
Zhu, Jun-Yan ;
Park, Taesung ;
Isola, Phillip ;
Efros, Alexei A. .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, :2242-2251