Spatial-temporal knowledge distillation for lightweight network traffic anomaly detection

被引:6
作者
Wang, Xintong [1 ,2 ,3 ]
Wang, Zixuan [1 ,2 ,3 ]
Wang, Enliang [1 ,2 ,3 ]
Sun, Zhixin [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Post Big Data Technol & Applicat Engn Res Ctr Jian, Nanjing 210023, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Post Ind Technol Res & Dev Ctr, State Posts Bur Internet Things Technol, Nanjing 210023, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Key Lab Broadband Wireless Commun & Sensor Network, Minist Educ, Nanjing 210003, Peoples R China
基金
中国国家自然科学基金;
关键词
Network traffic anomaly detection; Knowledge distillation; Multi -scale spatial -temporal residual network; Focal loss; Deep learning; Network intrusion detection; INTRUSION DETECTION SYSTEM; AUTOENCODER; MODEL;
D O I
10.1016/j.cose.2023.103636
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning-based network traffic anomaly detection methods have been the mainstream approaches to enhancing the accuracy performance of Network Intrusion Detection Systems (NIDSs). However, there are several problems that remain to be addressed in practical scenarios. First, the memory and computing power of intelligent terminals restrict the deployment of computationally intensive deep learning methods. Second, the depth and width of representations are of central significance for the accuracy of detection, at the cost of memory consumption and computational complexity. Third, the long tail effect spawned by the category imbalance of network traffic is prevalent in real-world fine-grained anomaly detection tasks. Therefore, we propose a SpatialTemporal Knowledge Distillation (STKD) algorithm framework for lightweight network traffic anomaly detection to tackle the challenges. Integrating multi-scale One-Dimensional Convolutional Neural Network (1D CNN) and Long Short-Term Memory Network (LSTM), and adopting identity mapping, we propose a Multi-Scale SpatialTemporal Residual Network (MSSTRNet) as the teacher model for deep spatial-temporal feature extraction of network traffic. Based on Knowledge Distillation (KD), we compress MSSTRNet to the lightweight student model named LENet which is suitable for deployment. Introducing Focal Loss (FL) instead of Cross Entropy (CE) Loss into the KD process, we attempt to alleviate the long tail effect in the fine-grained anomaly detection tasks. Experiments demonstrate the superiority of our proposed methods on accuracy performance, memory consumption and computation complexity.
引用
收藏
页数:14
相关论文
共 49 条
[1]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[2]   GAN augmentation to deal with imbalance in imaging-based intrusion detection [J].
Andresini, Giuseppina ;
Appice, Annalisa ;
De Rose, Luca ;
Malerba, Donato .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 123 (123) :108-127
[3]   Autoencoder-based deep metric learning for network intrusion detection [J].
Andresini, Giuseppina ;
Appice, Annalisa ;
Malerba, Donato .
INFORMATION SCIENCES, 2021, 569 (569) :706-727
[4]   An efficient network behavior anomaly detection using a hybrid DBN-LSTM network [J].
Chen, Aiguo ;
Fu, Yang ;
Zheng, Xu ;
Lu, Guoming .
COMPUTERS & SECURITY, 2022, 114
[5]   A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data [J].
Cui, Jiyuan ;
Zong, Liansong ;
Xie, Jianhua ;
Tang, Mingwei .
APPLIED INTELLIGENCE, 2023, 53 (01) :272-288
[6]  
Dauphin YN, 2017, PR MACH LEARN RES, V70
[7]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[8]   Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection [J].
Ding, Hongwei ;
Chen, Leiyang ;
Dong, Liang ;
Fu, Zhongwang ;
Cui, Xiaohui .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 131 :240-254
[9]   A Deep Learning Model for Network Intrusion Detection with Imbalanced Data [J].
Fu, Yanfang ;
Du, Yishuai ;
Cao, Zijian ;
Li, Qiang ;
Xiang, Wei .
ELECTRONICS, 2022, 11 (06)
[10]   Deep learning methods in network intrusion detection: A survey and an objective comparison [J].
Gamage, Sunanda ;
Samarabandu, Jagath .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 169