期刊文献+

基于端到端记忆神经网络的可解释入侵检测模型 被引量:3

Explainable Intrusion Detecion Model Based on End-to-End Memory Network
下载PDF
导出
摘要 目前提出的误用检测和异常检测相结合的算法,大多采用复合模型或组合模型来实现,这些方法通常需要训练不止一个基本模型,学习过程复杂.本文提出一种基于端到端记忆神经网络的入侵检测模型,能够在利用领域知识辅助网络行为数据分类的同时,使用端到端的方式训练模型以降低学习复杂度.模型设计了匹配模块和融合模块,使相关攻击知识项能够在分类模块发挥辅助作用.除检测结果外,模型还能够输出关于检测结果的可解释信息.本文对数据集进行归一化处理,并从数据集中提取出攻击知识项用于辅助分类.实验结果表明,本文方法中领域知识起到了较好的辅助分类作用,模型最终取得较高的检测精度. There are different methods combining misuse and anomaly detection for intrusion detection. However, most of them consist of more than one basic models which complicate the learning process. In this paper, we present an effective intrusion detection method with low complexity on the basis of the end-to-end memory network to classify the network behavior data by taking advantage of domain knowledge. A matching module and a blending module are designed in our model to ensure that relevant knowledge items take effect in the classify module. Furthermore, additional output are provided with the detecting result as explainable reference information. Data pre-processing is done using data normalization and knowledge items about attacks are selected from the dataset. Experimental results show that the domain knowledge plays a positive role in the model and the proposed method has good performance on intrusion detecting..
作者 高筱娴 龙春 魏金侠 赵静 宋丹劼 GAO Xiao-Xian;LONG Chun;WEI Jin-Xia;ZHAO Jing;SONG Dan-Jie(Computer Network Information Center,Chinese Academy of Sciences,Beijing 100190,China;University of Chinese Academy of Sciences,Beijing 100049,China)
出处 《计算机系统应用》 2018年第10期170-176,共7页 Computer Systems & Applications
关键词 端到端记忆神经网络 入侵检测 机器学习 分类算法 end-to-end memory network intrusion detection machine learning classification algorithm
  • 相关文献

参考文献3

二级参考文献18

  • 1罗守山.入侵检测[M]北京:北京邮电大学出版社,200313.
  • 2韩东海;王超;李群.入侵检测系统及实例剖析[M]北京:清华大学出版社,2002.
  • 3李剑.入侵检测技术[M]北京:高等教育出版社,20088-11.
  • 4胡昌振.入侵检测原理与技术[M]北京:北京理工大学出版社,201011.
  • 5Elngar A A, E1 A M D A, Ghaleb F F M. A Real-Time Anomaly Network Intrusion Detection System with High Accuracy[J]. Information Sciences Letters, 2013, 35(3):49-56.
  • 6Subaira. A S, Anitha. E A Survey: Network Intrusion Detection System based on Data Mining Techniques[J]. International Journal of Computer Science & Mobile Computing, 2013, 2(10):174-185.
  • 7Hsieh C F, Cheng K F, Huang Y F, et al. An Intrusion Detection System for Ad Hoc Networks with Mul- ti-attacks Based on a Support Vector Machine and Rough Set Theory[J]. Journal of Convergence Information Technology, 2013, 26(5):269-281.
  • 8Hong H U, Chen Y E Research on Hybrid Intrusion De- tection System Based on Random Forest Algorithm[J]. Journal of Xian University of Arts & Science, 2013, 37(8):28-39.
  • 9Yan-Qun x u, Zhang B, Qin X T. Clustering Intrusion Detection Model Based on Grey Fuzzy K-mean Cluster- ing[J]. Journal of Chongqing Normal University, 2013, 30(1):81-83.
  • 10Koc L, Mazzuehi T A, Sarkani S. A network intrusion detection system based on a Hidden Naive Bayes mul- ticlass classifier[J]. Expert Systems with Applications, 2012, 39(18):492 - 500.

共引文献6

同被引文献23

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部