Fusion of transformer and ML-CNN-BiLSTM for network intrusion detection

被引:5
作者
Xiang, Zelin [1 ]
Li, Xuwei [2 ]
机构
[1] Sichuan Int Studies Univ, Chengdu Inst, Publ Infrastruct Dept, Dujiangyan 611844, Sichuan, Peoples R China
[2] Sichuan Univ, Coll Comp Sci, Chengdu 610065, Sichuan, Peoples R China
关键词
Network intrusion detection; Data enhancement; Auto-Encoder; Transformer module; BiLSTM; GAN-Cross;
D O I
10.1186/s13638-023-02279-8
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network intrusion detection system (NIDS) can effectively sense network attacks, which is of great significance for maintaining the security of cyberspace. To meet the requirements of efficient and accurate network status monitoring, a NIDS model using Transformer-based fusion deep learning architecture is proposed. Firstly, GAN-Cross is used to expand minority class sample data, thereby alleviating the issues of imbalanced minority class about the original dataset. Then, the Transformer module is used to adjust the ML-CNN-BiLSTM model to enhance the feature encoding ability of the intrusion model. Finally, the data enhancement model and feature enhancement model are integrated into the NIDS model, the detection model is optimized, the features of network state data are extracted at a deeper level, and the generalization ability of the detection model is enhanced. Some simulation experiments using UNSW-NB15 datasets show that the proposed fusion architecture can achieve efficient analysis of complex network traffic datasets, with an accuracy of 0.903, effectively improving the detection accuracy of NIDS and its ability to detect unknown attacks. The proposed model has good application value in ensuring the stable operation of network systems.
引用
收藏
页数:22
相关论文
共 35 条
  • [1] A deep learning- based frechet and dirichlet model for intrusion detection in IWSN
    Alzubi, Omar A.
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (02) : 873 - 883
  • [2] Intrusion detection techniques in network environment: a systematic review
    Ayyagari, Maruthi Rohit
    Kesswani, Nishtha
    Kumar, Munish
    Kumar, Krishan
    [J]. WIRELESS NETWORKS, 2021, 27 (02) : 1269 - 1285
  • [3] An Autoencoder-Enhanced Stacking Neural Network Model for Increasing the Performance of Intrusion Detection
    Brunner, Csaba
    Ko, Andrea
    Fodor, Szabina
    [J]. JOURNAL OF ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING RESEARCH, 2022, 12 (02) : 149 - 163
  • [4] [曹磊 Cao Lei], 2021, [计算机工程与应用, Computer Engineering and Application], V57, P142
  • [5] Multi-level Gaussian mixture modeling for detection of malicious network traffic
    Chapaneri, Radhika
    Shah, Seema
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (05) : 4618 - 4638
  • [6] Study on network security intrusion target detection method in big data environment
    Chen, Jia
    Miao, Yingkai
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2021, 14 (04) : 240 - 247
  • [7] Hybrid Optimization Enabled Robust CNN-LSTM Technique for Network Intrusion Detection
    Deore, Bhushan
    Bhosale, Surendra
    [J]. IEEE ACCESS, 2022, 10 : 65611 - 65622
  • [8] [郭志民 Guo Zhimin], 2021, [重庆大学学报, Journal of Chongqing University], V44, P81
  • [9] CGAN-Based Collaborative Intrusion Detection for UAV Networks: A Blockchain-Empowered Distributed Federated Learning Approach
    He, Xiaoqiang
    Chen, Qianbin
    Tang, Lun
    Wang, Weili
    Liu, Tong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 120 - 132
  • [10] Hierarchical Long Short-Term Memory Network for Cyberattack Detection
    Hou, Haixia
    Xu, Yingying
    Chen, Menghan
    Liu, Zhi
    Guo, Wei
    Gao, Mingcheng
    Xin, Yang
    Cui, Lizhen
    [J]. IEEE ACCESS, 2020, 8 : 90907 - 90913