Intrusion Detection System Based on ViTCycleGAN and Rules

被引:0
|
作者
Fang, Menghao [1 ]
Li, Xia [2 ]
Wang, Yuanyuan [3 ]
Wang, Qiuxuan [4 ]
Sun, Xinlei [5 ]
Zhang, Shuo [2 ]
机构
[1] Univ Int Relat, Sch Cyber Sci & Engn, Beijing 100091, Peoples R China
[2] Dalian Maritime Univ, Marine Engn Coll, Dalian 116026, Liaoning, Peoples R China
[3] Anyang Normal Univ, Sch Math & Stat, Anyang 455099, Peoples R China
[4] Dalian Maritime Univ, Nav Coll, Dalian 116026, Liaoning, Peoples R China
[5] Dalian Maritime Univ, Informat Sci & Technol Coll, Dalian 116026, Liaoning, Peoples R China
关键词
Deep Learning; Intrusion Detection; Neural Network; Information Security;
D O I
10.1007/978-981-97-5588-2_18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper explores the application of deep learning techniques in the field of intrusion detection and its potential problems. Possible challenges of deep learning in intrusion detection include handling the imbalance between positive and negative samples, which leads to unstable model performance in distinguishing normal and abnormal traffic. To address this issue, the paper proposes combining deep learning-based intrusion detection techniques with a rule-based approach to enhance the system's adaptability and intelligence. The specific scheme includes four Vision Transformer models, two generators, and two discriminators. The discriminators are used to differentiate normal traffic and detect abnormal behaviors, following strict detection rules to reach a final determination. Through validation on the NSL-KDD dataset and CIC-DDOS2019 dataset, the proposed scheme achieves accuracies of 98.32% and 99.23%, respectively, providing new research insights and solutions in the field of intrusion detection.
引用
收藏
页码:203 / 214
页数:12
相关论文
共 50 条
  • [21] An Intrusion Detection System Based on WiMAX
    Zhou, Bo
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2448 - 2451
  • [22] Host Based Intrusion Detection System
    Kothari, Sandip
    Parmar, Hemant
    Das, Eshan
    Panda, Neroja
    Ahmed, Afrin
    Marchang, Jims
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, : 336 - 339
  • [23] HOST BASED INTRUSION DETECTION SYSTEM
    Kothari, Sandip
    Parmar, Hemant
    Das, Eshan
    Panda, Neroja
    Ahmed, Afrin
    Marchang, Jims
    2011 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND TECHNOLOGY (ICMET 2011), 2011, : 875 - 878
  • [24] NetFlow Based Intrusion Detection System
    Wang Zhenqi
    Wang Xinyu
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 825 - 828
  • [25] Bayesian based intrusion detection system
    Altwaijry, Hesham
    Algarny, Saeed
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2012, 24 (01) : 1 - 6
  • [26] Review on Intrusion Detection System Based on The Goal of The Detection System
    Khaleel, Mohammad Khamees
    Ismail, Mohd Arfian
    Yunan, Umar
    Kasim, Shahreen
    INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING, 2018, 10 (06): : 197 - 202
  • [27] Comparison of Performance for Intrusion Detection System Using Different Rules of Classification
    Sengupta, Nandita
    Sil, Jaya
    COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 87 - +
  • [28] A Fast Detection System for WSN Node Intrusion on the Basis of Association Rules
    Liu, Zaiying
    Menni, Younes
    Engineering Intelligent Systems, 2023, 31 (05): : 337 - 345
  • [29] Effective intrusion detection model through the combination of a signature-based intrusion detection system and a machine learning-based intrusion detection system
    Weon, Ill-Young
    Song, Doo Heon
    Lee, Chang-Hoon
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (06) : 1447 - 1464
  • [30] Association Rules Applied to Intrusion Detection
    Mao Ping ping
    Wuhan University Journal of Natural Sciences, 2002, (04) : 426 - 430