Gated recurrent unit-based parallel network traffic anomaly detection using subagging ensembles

被引:8
作者
Tao, Xiaoling [1 ,2 ]
Peng, Yang [1 ,2 ]
Zhao, Feng [3 ]
Yang, Changsong [1 ,2 ]
Qiang, Baohua [1 ,2 ]
Wang, Yufeng [4 ]
Xiong, Zuobin [5 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[3] Guilin Univ Elect Technol, Sch Informat & Commun, Guilin 541004, Peoples R China
[4] China Elect Technol Grp Corp, Res Inst 54, Shijiazhuang 050000, Hebei, Peoples R China
[5] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
基金
中国国家自然科学基金;
关键词
Wireless network; Parallel; Network traffic anomaly detection; GRU; GA; Subagging;
D O I
10.1016/j.adhoc.2021.102465
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, wireless network evolution has been primarily driven by a need for higher rates. The ongoing deployment of 5G cellular systems is continuously exposing the inherent limitations of this system, which promote the exploration of 6th generation mobile networks (6G). However, development is bound to be challenging. The complex network environment, rapidly growing data volume and new types of network attacks and anomalies will become an obstacle to network security protection. To solve these problems, we propose a novel parallel subagging-GRU-based network traffic anomaly detection method (PSB-GRU) for identifying anomalies in the network. Considering the advantages of gated recurrent unit (GRU) self-learning and long-term dependency processing, we use it as the main structure of anomaly detection, and we use a genetic algorithm (GA) to realize the intelligentization of its training process. In addition, we introduce the Spark platform to parallelize the detection process and improve detection efficiency. Additionally, to reduce the variance and mean square error in all order terms and improve the generalization ability of the detection model, we utilize a subagging algorithm to reinforce the detection model. Finally, we compare our anomaly detection method with some existing algorithms and show that the anomaly detection performance of the proposed method is better than that of the recurrent neural network methods (RNN, LSTM and GRU).
引用
收藏
页数:11
相关论文
共 47 条
[1]   Hadoop-GIS: A High Performance Spatial Data Warehousing System over MapReduce [J].
Aji, Ablimit ;
Wang, Fusheng ;
Vo, Hoang ;
Lee, Rubao ;
Liu, Qiaoling ;
Zhang, Xiaodong ;
Saltz, Joel .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (11) :1009-1020
[2]   An architecture for resilient intrusion detection in ad -hoc networks [J].
Al Qurashi, Mohammed ;
Angelopoulos, Constantinos Marios ;
Katos, Vasilios .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
[3]   Convex Optimization: Algorithms and Complexity [J].
不详 .
FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2015, 8 (3-4) :232-+
[4]   Deep Reinforcement Learning A brief survey [J].
Arulkumaran, Kai ;
Deisenroth, Marc Peter ;
Brundage, Miles ;
Bharath, Anil Anthony .
IEEE SIGNAL PROCESSING MAGAZINE, 2017, 34 (06) :26-38
[5]  
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[6]   A new evolutionary neural networks based on intrusion detection systems using multiverse optimization [J].
Benmessahel, Ilyas ;
Xie, Kun ;
Chellal, Mouna .
APPLIED INTELLIGENCE, 2018, 48 (08) :2315-2327
[7]   Bagging predictors [J].
Breiman, L .
MACHINE LEARNING, 1996, 24 (02) :123-140
[8]  
Bühlmann P, 2002, ANN STAT, V30, P927
[9]  
Canêdo D, 2019, IEEE LAT AM T, V17, P1109, DOI 10.1109/TLA.2019.8931198
[10]  
Cho K., 2014, P 2014 C EMP METH NA, P1724, DOI 10.3115/v1/d14-1179