A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism

被引:8
作者
Cai, Saihua [1 ,2 ]
Xu, Han [1 ]
Liu, Mingjie [1 ]
Chen, Zhilin [1 ]
Zhang, Guofeng [3 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Peoples R China
[2] Jiangsu Univ, Jiangsu Key Lab Secur Technol Ind Cyberspace, Zhenjiang 212013, Peoples R China
[3] Taishan Univ, Sch Informat Sci & Technol, Tai An 271000, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious network traffic detection; Bidirectional temporal convolutional network; Multi -head self -attention mechanism; Cross -entropy loss function; Deep learning;
D O I
10.1016/j.cose.2023.103580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasingly frequent network intrusions have brought serious impacts to the production and life, thus malicious network traffic detection has received more and more attention in recent years. However, the traditional rule matching-based and machine learning-based malicious network traffic detection methods have the problems of relying on human experience as well as low detection efficiency. The continuous development of deep learning technology provides new ideas to solve malicious network traffic detection, and the deep learning models are also widely used in the field of malicious network traffic detection. Compared with other deep learning models, bidirectional temporal convolutional network (BiTCN) has achieved better detection results due to its ability to obtain bidirectional semantic features of network traffic, but it does not consider the different meanings as well as different importance of different subsequence segments in network traffic sequences; In addition, the loss function used in BiTCN is the negative log likelihood function, which may lead to overfitting problems when facing multi-classification problems and data imbalance problems. To solve these problems, this paper proposes a malicious network traffic detection model based on BiTCN and multi-head self-attention (MHSA) mechanism, namely BiTCN_MHSA, it innovatively uses the MHSA mechanism to assign different weights to different subsequences of network traffic, thus making the model more focused on the characteristics of malicious network traffic as well as improving the efficiency of processing global network traffic; Moreover, it also changes its loss function to a cross-entropy loss function to penalize misclassification more severely, thereby speeding up the convergence. Finally, extensive experiments are conduced to evaluate the efficiency of proposed BiTCN_MHSA model on two public network traffic, the experimental results verify that the proposed BiTCN_MHSA model outperforms six state-of-the-arts in precision, recall, F1-measure and accuracy.
引用
收藏
页数:17
相关论文
共 44 条
[31]   Accelerating Decision Tree Based Traffic Classification on FPGA and Multicore Platforms [J].
Tong, Da ;
Qu, Yun Rock ;
Prasanna, Viktor K. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2017, 28 (11) :3046-3059
[32]   Tactical Provenance Analysis for Endpoint Detection and Response Systems [J].
Ul Hassan, Wajih ;
Bates, Adam ;
Marino, Daniel .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1172-1189
[33]  
Vasiliadis G, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P297
[34]   Dual Super-Resolution Learning for Semantic Segmentation [J].
Wang, Li ;
Li, Dong ;
Zhu, Yousong ;
Tian, Lu ;
Shan, Yi .
2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, :3773-3782
[35]  
Wang W, 2017, 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P712, DOI 10.1109/ICOIN.2017.7899588
[36]   Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study [J].
Wang, Zihao ;
Fok, Kar Wai ;
Thing, Vrizlynn L. L. .
COMPUTERS & SECURITY, 2022, 113
[37]   Adoption and realization of deep learning in network traffic anomaly detection device design [J].
Wei, Guanglu ;
Wang, Zhonghua .
SOFT COMPUTING, 2021, 25 (02) :1147-1158
[38]   Pelican: A Deep Residual Network for Network Intrusion Detection [J].
Wu, Peilun ;
Guo, Hui ;
Moustafa, Nour .
50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2020), 2020, :55-62
[39]  
Xu G, 2021, Journal of Physics: Conference Series, V1861
[40]   Dependable federated learning for IoT intrusion detection against poisoning attacks [J].
Yang, Run ;
He, Hui ;
Wang, Yulong ;
Qu, Yue ;
Zhang, Weizhe .
COMPUTERS & SECURITY, 2023, 132