A Time Series Intrusion Detection Method Based on SSAE, TCN and Bi-LSTM

被引:2
|
作者
He, Zhenxiang [1 ]
Wang, Xunxi [1 ]
Li, Chunwei [1 ]
机构
[1] Gansu Univ Polit Sci & Law, Sch Cyberspace Secur, Lanzhou 730000, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 78卷 / 01期
关键词
Network intrusion detection; bidirectional long short-term memory network; time series; stacked sparse autoencoder; temporal convolutional network; time steps; NETWORK;
D O I
10.32604/cmc.2023.046607
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the fast-evolving landscape of digital networks, the incidence of network intrusions has escalated alarmingly. Simultaneously, the crucial role of time series data in intrusion detection remains largely underappreciated, with most systems failing to capture the time-bound nuances of network traffic. This leads to compromised detection accuracy and overlooked temporal patterns. Addressing this gap, we introduce a novel SSAE-TCN-BiLSTM (STL) model that integrates time series analysis, significantly enhancing detection capabilities. Our approach reduces feature dimensionality with a Stacked Sparse Autoencoder (SSAE) and extracts temporally relevant features through a Temporal Convolutional Network (TCN) and Bidirectional Long Short-term Memory Network (Bi-LSTM). By meticulously adjusting time steps, we underscore the significance of temporal data in bolstering detection accuracy. On the UNSW-NB15 dataset, our model achieved an F1-score of 99.49%, Accuracy of 99.43%, Precision of 99.38%, Recall of 99.60%, and an inference time of 4.24 s. For the CICDS2017 dataset, we recorded an F1-score of 99.53%, Accuracy of 99.62%, Precision of 99.27%, Recall of 99.79%, and an inference time of 5.72 s. These findings not only confirm the STL model's superior performance but also its operational efficiency, underpinning its significance in real-world cybersecurity scenarios where rapid response is paramount. Our contribution represents a significant advance in cybersecurity, proposing a model that excels in accuracy and adaptability to the dynamic nature of network traffic, setting a new benchmark for intrusion detection systems.
引用
收藏
页码:845 / 871
页数:27
相关论文
共 50 条
  • [21] Adverse Drug Reaction Posts Detection with a Bi-LSTM based approach
    Lee, Chung-Chun
    Lee, Seunghee
    Song, Mi Hwa
    Lee, Suehyun
    2023 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING, BIGCOMP, 2023, : 322 - 323
  • [22] Attention-Based Bi-LSTM Network for Abusive Language Detection
    Nelatoori, Kiran Babu
    Kommanti, Hima Bindu
    IETE JOURNAL OF RESEARCH, 2023, 69 (11) : 7884 - 7892
  • [23] Fog-Enabled Intrusion Detection Method Integrating Bi-LSTM and Multi-Head Self-Attention for IoT
    Tian, Shizhao
    Wang, Zhen
    Xie, Kaiyu
    Chen, Fansong
    Li, Hongsong
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1998 - 2003
  • [24] Students Engagement Level Detection in Online e-Learning Using Hybrid EfficientNetB7 Together With TCN, LSTM, and Bi-LSTM
    Selim, Tasneem
    Elkabani, Islam
    Abdou, Mohamed A.
    IEEE ACCESS, 2022, 10 : 99573 - 99583
  • [25] Research on Seismic Phase Recognition Method Based on Bi-LSTM Network
    Wang, Li
    Cai, Jianxian
    Duan, Li
    Guo, Lili
    Shi, Xingxing
    Cai, Huanyu
    APPLIED SCIENCES-BASEL, 2024, 14 (16):
  • [26] A Method for Intrusion Detection in Web Services Based on Time Series
    Shirani, Paria
    Azgomi, Mohammad Abdollahi
    Alrabaee, Saed
    2015 IEEE 28TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2015, : 836 - 841
  • [27] Enhanced cloud security: a novel intrusion detection system using ARSO algorithm and Bi-LSTM classifier
    Silambarasan E.
    Suryawanshi R.
    Reshma S.
    International Journal of Information Technology, 2024, 16 (6) : 3837 - 3845
  • [28] FRD-LSTM: a novel technique for fake reviews detection using DCWR with the Bi-LSTM method
    Huma Qayyum
    Farooq Ali
    Marriam Nawaz
    Tahira Nazir
    Multimedia Tools and Applications, 2023, 82 : 31505 - 31519
  • [29] Bi-LSTM based rolling forecast of subgrade post-construction settlement with unevenly spaced time series
    Chen, Wei-Hang
    Luo, Qiang
    Wang, Teng-Fei
    Jiang, Liang-Wei
    Zhang, Liang
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2022, 56 (04): : 683 - 691
  • [30] FRD-LSTM: a novel technique for fake reviews detection using DCWR with the Bi-LSTM method
    Qayyum, Huma
    Ali, Farooq
    Nawaz, Marriam
    Nazir, Tahira
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (20) : 31505 - 31519