Network Intrusion Detection Based on Transformer Model

被引:0
作者
Tang, Shijun [1 ]
机构
[1] Schreiner Univ, Dept Comp Sci, Kerrville, TX 78028 USA
来源
SECURITY AND MANAGEMENT AND WIRELESS NETWORKS, SAM 2024, ICWN 2024 | 2025年 / 2254卷
关键词
Network intrusion detection; Attention Mechanism; Network attack; Transformer model; Cybersecurity; ALGORITHM; SYSTEMS;
D O I
10.1007/978-3-031-86637-1_2
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we present a new technique based on the Attention Mechanism of transformer model. The proposed solution is a modified version of the transformer model which has been proposed and used in the language translation domain. We conduct experiments on a dataset containing network attacks. We have evaluated our performance results and demonstrated that the proposed model significantly has good accuracy, precision, recall, and false positive rates. The experimental results indicate that the proposed approach is efficient and effective in dealing with network attacks.
引用
收藏
页码:22 / 30
页数:9
相关论文
共 31 条
[1]   A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data [J].
Agarap, Abien Fred M. .
PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018), 2018, :26-30
[2]  
Ayogu B.A., 2019, FUOYE J. Eng. Technol., P71
[3]  
Bahdanau D, 2016, Arxiv, DOI arXiv:1409.0473
[4]  
Brown A, 2018, Arxiv, DOI arXiv:1803.04967
[5]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[6]   Adversarial environment reinforcement learning algorithm for intrusion detection [J].
Caminero, Guillermo ;
Lopez-Martin, Manuel ;
Carro, Belen .
COMPUTER NETWORKS, 2019, 159 :96-109
[7]   Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models [J].
Casajus-Setien, Jorge ;
Bielza, Concha ;
Larranaga, Pedro .
2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, :72-77
[8]  
Chapaneri Radhika, 2019, Smart Intelligent Computing and Applications. Proceedings of the Second International Conference on SCI 2018. Smart Innovation, Systems and Technologies (SIST 104), P345, DOI 10.1007/978-981-13-1921-1_35
[9]  
Farid D.M., 2010, Int. J. Network Secur. Appl., P2
[10]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28