Intrusion detection: A model based on the improved vision transformer

被引:23
作者
Yang, Yu-Guang [1 ,2 ]
Fu, Hong-Mei [1 ]
Gao, Shang [1 ]
Zhou, Yi-Hua [1 ]
Shi, Wei-Min [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Beijing Key Lab Trusted Comp, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
ENSEMBLE;
D O I
10.1002/ett.4522
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We propose an intrusion detection model based on an improved vision transformer (ViT). More specifically, the model uses an attention mechanism to process data, which overcomes the flaw of the short-term memory in recurrent neural network (RNN) and the difficulty of learning remote dependency in convolutional neural network. It supports parallelization and has a faster computing speed than RNN. A sliding window mechanism is presented to improve the capability of modeling local features for ViT. The hierarchical focal loss function is used to improve the classification effect, and solve the issue of the data imbalance. The public intrusion detection dataset NSL-KDD is used for experimental simulations. By experimental simulations, the accuracy is up to 99.68%, the false-positive rate is 0.22%, and the recall rate is 99.57%, which show that the improved ViT has better accuracy, false positive rate, and recall rate than existing intrusion detection models.
引用
收藏
页数:18
相关论文
共 41 条
[1]   GAN augmentation to deal with imbalance in imaging-based intrusion detection [J].
Andresini, Giuseppina ;
Appice, Annalisa ;
De Rose, Luca ;
Malerba, Donato .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 123 (123) :108-127
[2]   An improved ensemble based intrusion detection technique usingXGBoost [J].
Bhati, Bhoopesh Singh ;
Chugh, Garvit ;
Al-Turjman, Fadi ;
Bhati, Nitesh Singh .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (06)
[3]  
Chu X. X., 2021, arXiv preprint arXiv:2104.13840
[4]  
Dosovitskiy A, 2020, ARXIV
[5]   A survey of neural networks usage for intrusion detection systems [J].
Drewek-Ossowicka, Anna ;
Pietrolaj, Mariusz ;
Ruminski, Jacek .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) :497-514
[6]   Quantum algorithm for kernelized correlation filter [J].
Gao, Shang ;
Pan, Shijie ;
Yang, Yuguang .
SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (02)
[7]   Exploiting Laguerre transform in image steganography [J].
Ghosal, Sudipta Kr ;
Mukhopadhyay, Souradeep ;
Hossain, Sabbir ;
Sarkar, Ram .
COMPUTERS & ELECTRICAL ENGINEERING, 2021, 89
[8]   Application of Lah transform for security and privacy of data through information hiding in telecommunication [J].
Ghosal, Sudipta Kr ;
Mukhopadhyay, Souradeep ;
Hossain, Sabbir ;
Sarkar, Ram .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (02)
[9]   An effective intrusion detection approach using SVM with naive Bayes feature embedding [J].
Gu, Jie ;
Lu, Shan .
COMPUTERS & SECURITY, 2021, 103
[10]   A novel approach to intrusion detection using SVM ensemble with feature augmentation [J].
Gu, Jie ;
Wang, Lihong ;
Wang, Huiwen ;
Wang, Shanshan .
COMPUTERS & SECURITY, 2019, 86 :53-62