Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM

被引:13
作者
Wang, Xiaoning [1 ]
Liu, Jia [2 ]
Zhang, Chunjiong [3 ]
机构
[1] Chongqing Vocat Inst Tourism, Chongqing 409099, Peoples R China
[2] Chongqing Coll Elect Engn, Chongqing, Peoples R China
[3] Tongji Univ, Coll Elect & Informat Engn, Shanghai 201804, Peoples R China
关键词
Anomaly detection; Attention mechanism; Bidirectional LSTM; Multi-domain learning; ANOMALY DETECTION; NEURAL-NETWORK; MECHANISM;
D O I
10.1186/s13635-023-00139-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Different types of network traffic can be treated as data originating from different domains with the same objectives of problem-solving. Previous work utilizing multi-domain machine learning has primarily assumed that data in different domains have the same distribution, which fails to effectively address the domain offset problem and may not achieve excellent performance in every domain. To address these limitations, this study proposes an attention-based bidirectional long short-term memory (Bi-LSTM) model for detecting coordinated network attacks, such as malware detection, VPN encapsulation recognition, and Trojan horse classification. To begin, HTTP traffic is modeled as a series of natural language sequences, where each request follows strict structural standards and language logic. The Bi-LSTM model is designed within the framework of multi-domain machine learning technologies to recognize anomalies of network attacks from different domains. Experiments on real HTTP traffic data sets demonstrate that the proposed model has good performance in detecting abnormal network traffic and exhibits strong generalization ability, enabling it to effectively detect different network attacks simultaneously.
引用
收藏
页数:14
相关论文
共 34 条
[1]   Ensemble unsupervised autoencoders and Gaussian mixture model for cyberattack detection [J].
An, Peng ;
Wang, Zhiyuan ;
Zhang, Chunjiong .
INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (02)
[2]   AI-GAN: ATTACK-INSPIRED GENERATION OF ADVERSARIAL EXAMPLES [J].
Bai, Tao ;
Zhao, Jun ;
Zhu, Jinlin ;
Han, Shoudong ;
Chen, Jiefeng ;
Li, Bo ;
Kot, Alex .
2021 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2021, :2543-2547
[3]  
Bedi Punam, 2020, Procedia Computer Science, V171, P780, DOI 10.1016/j.procs.2020.04.085
[4]   A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN [J].
Deng, Libing ;
Xie, Guoqi ;
Liu, Hong ;
Han, Yunbo ;
Li, Renfa ;
Li, Keqin .
ACM COMPUTING SURVEYS, 2023, 55 (02)
[5]  
Ferrag MA., 2020, J. Inform. Secur. Appl, V50, P1
[6]   LIO-IDS: Handling class imbalance using LSTM and improved one-vs-one technique in intrusion detection system [J].
Gupta, Neha ;
Jindal, Vinita ;
Bedi, Punam .
COMPUTER NETWORKS, 2021, 192
[7]   Accelerating convolutional neural network-based malware traffic detection through ant-colony clustering [J].
Huang, He ;
Deng, Haojiang ;
Sheng, Yiqiang ;
Ye, Xiaozhou .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (01) :409-423
[8]   Classification of Imbalanced Data by Combining the Complementary Neural Network and SMOTE Algorithm [J].
Jeatrakul, Piyasak ;
Wong, Kok Wai ;
Fung, Chun Che .
NEURAL INFORMATION PROCESSING: MODELS AND APPLICATIONS, PT II, 2010, 6444 :152-159
[9]  
Joshi Mahesh, 2012, P 2012 JOINT C EMPIR, P1302
[10]   Online anomaly detection using dimensionality reduction techniques for HTTP log analysis [J].
Juvonen, Antti ;
Sipola, Tuomo ;
Hamalainen, Timo .
COMPUTER NETWORKS, 2015, 91 :46-56