Intrusion Detection System Based on ViTCycleGAN and Rules

被引:0
|
作者
Fang, Menghao [1 ]
Li, Xia [2 ]
Wang, Yuanyuan [3 ]
Wang, Qiuxuan [4 ]
Sun, Xinlei [5 ]
Zhang, Shuo [2 ]
机构
[1] Univ Int Relat, Sch Cyber Sci & Engn, Beijing 100091, Peoples R China
[2] Dalian Maritime Univ, Marine Engn Coll, Dalian 116026, Liaoning, Peoples R China
[3] Anyang Normal Univ, Sch Math & Stat, Anyang 455099, Peoples R China
[4] Dalian Maritime Univ, Nav Coll, Dalian 116026, Liaoning, Peoples R China
[5] Dalian Maritime Univ, Informat Sci & Technol Coll, Dalian 116026, Liaoning, Peoples R China
关键词
Deep Learning; Intrusion Detection; Neural Network; Information Security;
D O I
10.1007/978-981-97-5588-2_18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper explores the application of deep learning techniques in the field of intrusion detection and its potential problems. Possible challenges of deep learning in intrusion detection include handling the imbalance between positive and negative samples, which leads to unstable model performance in distinguishing normal and abnormal traffic. To address this issue, the paper proposes combining deep learning-based intrusion detection techniques with a rule-based approach to enhance the system's adaptability and intelligence. The specific scheme includes four Vision Transformer models, two generators, and two discriminators. The discriminators are used to differentiate normal traffic and detect abnormal behaviors, following strict detection rules to reach a final determination. Through validation on the NSL-KDD dataset and CIC-DDOS2019 dataset, the proposed scheme achieves accuracies of 98.32% and 99.23%, respectively, providing new research insights and solutions in the field of intrusion detection.
引用
收藏
页码:203 / 214
页数:12
相关论文
共 50 条
  • [41] On the capability of an SOM based intrusion detection system
    Kayacik, HG
    Zincir-Heywood, AN
    Heywood, MI
    PROCEEDINGS OF THE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS 2003, VOLS 1-4, 2003, : 1808 - 1813
  • [42] Intrusion detection system based on mobile agent
    Zhu, LP
    Li, Q
    Wang, X
    ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 7888 - 7891
  • [43] A multiple agents based intrusion detection system
    Ma, WL
    Sharma, D
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2005, 3681 : 205 - 211
  • [44] MOBILE AGENT BASED INTRUSION DETECTION SYSTEM
    Can, Okan
    2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 1363 - 1366
  • [45] Cloud Intrusion Detection System Based on SVM
    Alheeti K.M.A.
    Lateef A.A.A.
    Alzahrani A.
    Imran A.
    Al Dosary D.
    International Journal of Interactive Mobile Technologies, 2023, 17 (11) : 101 - 114
  • [46] Intrusion Detection System Based on Pattern Recognition
    Mohamed M. Abdeldayem
    Arabian Journal for Science and Engineering, 2023, 48 : 9849 - 9857
  • [47] A Constraint-based Intrusion Detection System
    Hasan, Md Siam
    Dean, Thomas
    Imam, Fahim T.
    Garcia, Francisco
    Leblanc, Sylvain P.
    Zulkernine, Mohammad
    PROCEEDINGS OF THE FIFTH EUROPEAN CONFERENCE ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS (ECBS 2017), 2017,
  • [48] Intrusion detection system based on load balancing
    Li, Ren-Fa
    Li, Hong
    Yu, Fei
    Xu, Cheng
    Xitong Fangzhen Xuebao / Journal of System Simulation, 2004, 16 (07):
  • [49] Method of Intrusion Detection System Based on SVM
    Jia, Yanru
    Peng, Jian
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, 2008, : 341 - 344
  • [50] An intrusion detection system based on the clustering ensemble
    Weng, Fangfei
    Jiang, Qingshan
    Shi, Liang
    Wu, Nannan
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 121 - +