Network Intrusion Detection Model Based on Space-time Fusion Features and Attention Mechanism

被引:0
作者
Wu, Yali [1 ]
Huang, Liting [1 ,2 ]
Qi, Jinjin [2 ]
Quan, Xiaoxiao [2 ]
机构
[1] Xian Univ Technol, Sch Automat & Informat Engn, Xian 710048, Peoples R China
[2] Shaanxi Prov Key Lab Complex Syst Control & Intel, Xian 710048, Peoples R China
来源
PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021) | 2021年
关键词
Network Intrusion Detection; Convolution Neural Network; Long Short-term Memory Network; Attention Mechanism; CLT-net;
D O I
10.1109/CCDC52312.2021.9602544
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To solve the problem of low performance of network intrusion detection, a deep learning intrusion detection model based on space-time fusion features and attention mechanism-CLT-net is proposed. In this model, space-time fusion features are obtained by integrating convolutional neural network and long short-time memory network, and attention module is added to calculate the importance of the input features, and softmax function is used for classification. Through a large number of simulation experiments on NSL-KDD data sets, CLT-net has significantly improved the convergence ofthe training set and the accuracy ofthe test set. Compared with the traditional CNN model with similar structure and the space-time fusion CLSTM the accuracy of the model increased by 11.8% and 10.9% respectively. Research shows that this model has great potential in the application field of network intrusion detection.
引用
收藏
页码:2533 / 2538
页数:6
相关论文
共 19 条
  • [1] Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection
    Ahmad, Iftikhar
    Basheri, Mohammad
    Iqbal, Muhammad Javed
    Rahim, Aneel
    [J]. IEEE ACCESS, 2018, 6 : 33789 - 33795
  • [2] Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection
    Al-Qatf, Majjed
    Yu Lasheng
    Al-Habib, Mohammed
    Al-Sabahi, Kamal
    [J]. IEEE ACCESS, 2018, 6 : 52843 - 52856
  • [3] [Anonymous], 2011, 2009 IEEE S COMP INT, DOI DOI 10.1080/02331880903348481
  • [4] He K., 2005, CVPR, V201, P1026
  • [5] Ingre B, 2005, 2015 INT C SIGN PROC, P92
  • [6] Ioffe S., 2015, PMLR, V37, P448
  • [7] Koc L, 2012, EXPERT SYSTEMS APPL, V39, p1 3492
  • [8] NETWORK INTRUSION DETECTION
    MUKHERJEE, B
    HEBERLEIN, LT
    LEVITT, KN
    [J]. IEEE NETWORK, 1994, 8 (03): : 26 - 41
  • [9] Qu X., 2019, MOBILE NETW APPL, V10, p1
  • [10] A hybrid intrusion detection system for virtual jamming attacks on wireless networks
    Santoro, Diego
    Escudero-Andreu, Gines
    Kyriakopoulos, Konstantinos G.
    Aparicio-Navarro, Francisco J.
    Parish, David J.
    Vadursi, Michele
    [J]. MEASUREMENT, 2017, 109 : 79 - 87