A Network Intrusion Detection Model Based on BiLSTM with Multi-Head Attention Mechanism

被引:12
作者
Zhang, Jingqi [1 ]
Zhang, Xin [1 ]
Liu, Zhaojun [1 ]
Fu, Fa [1 ]
Jiao, Yihan [1 ]
Xu, Fei [2 ]
机构
[1] Hainan Univ, Coll Comp Sci & Technol, Haikou 570228, Peoples R China
[2] Hainan Univ, Coll Civil & Architecture Engn, Haikou 570228, Peoples R China
关键词
intrusion detection; deep learning; multi-head attention; BiLSTM; MACHINE;
D O I
10.3390/electronics12194170
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A network intrusion detection tool can identify and detect potential malicious activities or attacks by monitoring network traffic and system logs. The data within intrusion detection networks possesses characteristics that include a high degree of feature dimension and an unbalanced distribution across categories. Currently, the actual detection accuracy of some detection models is relatively low. To solve these problems, we propose a network intrusion detection model based on multi-head attention and BiLSTM (Bidirectional Long Short-Term Memory), which can introduce different attention weights for each vector in the feature vector that strengthen the relationship between some vectors and the detection attack type. The model also utilizes the advantage that BiLSTM can capture long-distance dependency relationships to obtain a higher detection accuracy. This model combined the advantages of the two models, adding a dropout layer between the two models to improve the detection accuracy while preventing training overfitting. Through experimental analysis, the network intrusion detection model that utilizes multi-head attention and BilSTM achieved an accuracy of 98.29%, 95.19%, and 99.08% on the KDDCUP99, NSLKDD, and CICIDS2017 datasets, respectively.
引用
收藏
页数:17
相关论文
共 35 条
[1]   A feature reduced intrusion detection system using ANN classifier [J].
Akashdeep ;
Manzoor, Ishfaq ;
Kumar, Neeraj .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 :249-257
[2]   Nearest cluster-based intrusion detection through convolutional neural networks [J].
Andresini, Giuseppina ;
Appice, Annalisa ;
Malerba, Donato .
KNOWLEDGE-BASED SYSTEMS, 2021, 216
[3]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[4]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[5]  
Chi Huang, 2022, 2022 International Conference on Blockchain Technology and Information Security (ICBCTIS), P32, DOI 10.1109/ICBCTIS55569.2022.00019
[6]   Intrusion Detection System in Smart Home Network Using Bidirectional LSTM and Convolutional Neural Networks Hybrid Model [J].
Elsayed, Nelly ;
Zaghloul, Zaghloul Saad ;
Azumah, Sylvia Worlali ;
Li, Chengcheng .
2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2021, :55-58
[7]   Framewise phoneme classification with bidirectional LSTM and other neural network architectures [J].
Graves, A ;
Schmidhuber, J .
NEURAL NETWORKS, 2005, 18 (5-6) :602-610
[8]  
Hochreiter S, 1997, NEURAL COMPUT, V9, P1735, DOI [10.1162/neco.1997.9.1.1, 10.1007/978-3-642-24797-2]
[9]  
Hou Haixia, 2022, 2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)., P125, DOI 10.1109/BigDataSecurityHPSCIDS54978.2022.00032
[10]   A novel statistical analysis and autoencoder driven intelligent intrusion detection approach [J].
Ieracitano, Cosimo ;
Adeel, Ahsan ;
Morabito, Francesco Carlo ;
Hussain, Amir .
NEUROCOMPUTING, 2020, 387 :51-62