期刊文献+

基于CNN_BiLSTM网络的入侵检测方法 被引量:9

CNN_BiLSTM Network Based Intrusion Detection Method
下载PDF
导出
摘要 网络攻击事件频发,正确高效地检测攻击行为对网络安全至关重要。该方法基于一维卷积神经网络和双向长短期记忆网络引入自注意力机制来检测恶意行为。首先借助随机森林来选择重要的特征作为模型输入以减少输入数据的冗余问题,之后利用一维卷积神经网络和双向长短期记忆网络分别提取空间特征和时间特征,将二者提取的特征“并联”得到融合特征,为了让有用的输入信息得到更好表达,引入了自注意力机制给融合后的特征分配不同的权重,用门控循环单元模型训练,最后利用softmax函数进行分类。为了验证模型的有效性,在UNSW_NB15数据集上进行了评估,实验表明该模型比单一的模型有着明显的性能提升。该方法将特征选择和深度学习模型相融合,能够有效去除噪声冗余,加快模型训练速度,具有较好的应用前景。 As network attacks frequently occur, correct and efficient detection against attack behavior is essential to network security. To detect malicious behavior, this paper proposes a self-attention mechanism using one-dimensional convolutional neural network(1D CNN)and bidirectional long short-term memory network(BiLSTM). Firstly, random forest is used to select important features as model inputs to reduce the redundancy of input data. Then 1D CNN and BiLSTM are applied to extract spatial and temporal features respectively. The features extracted by the two parallel are merged to obtain the fused features. In order to express useful input information better, the proposed method introduces self-attention mechanism to assign different weights for the fused features, trains them with a gated recurrent unit(GRU)model, and finally uses the softmax function for classification. In order to verify the effectiveness of the model, an evaluation is conducted on the UNSW_NB15 dataset. Experiments show that the model has a significant performance improvement over a single model. This paper combines feature selection and deep learning model, which can effectively remove noise redundancy, speed up model training, and has a good application prospect.
作者 马明艳 陈伟 吴礼发 MAMingyan;CHEN Wei;WU Lifa(School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China)
出处 《计算机工程与应用》 CSCD 北大核心 2022年第10期116-124,共9页 Computer Engineering and Applications
基金 国家重点研发计划(2019YFB2101704)。
关键词 特征选择 一维卷积 双向长短期记忆网络 自注意力机制 入侵检测 feature selection one-dimensional convolution bidirectional long short-term memory network self-attention mechanism intrusion detection
  • 相关文献

参考文献9

二级参考文献46

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:231
  • 2张海,王尧,常象宇,徐宗本.L_(1/2)正则化[J].中国科学:信息科学,2010,40(3):412-422. 被引量:14
  • 3张新波.两阶段模糊C-均值聚类算法[J].电路与系统学报,2005,10(2):117-120. 被引量:21
  • 4陈友,程学旗,李洋,戴磊.基于特征选择的轻量级入侵检测系统[J].软件学报,2007,18(7):1639-1651. 被引量:78
  • 5陈友,沈华伟,李洋,程学旗.一种高效的面向轻量级入侵检测系统的特征选择算法[J].计算机学报,2007,30(8):1398-1408. 被引量:46
  • 6Lee W, Stolfo S J. Data mining approaches for intrusion detection [C] //Proc of the 7th USENIX Security Symposium. Berkeley, GA USENIX Association, 1998: 79-93.
  • 7Denatious D K, John A. Survey on data mining techniques to enhance intrusion detection [C] //Proc of the 2012 Int Conf on Computer Communication and Informatics. Piscataway, NJ IEEE, 2012:1-5.
  • 8Chitrakar R, Huang Chuanhe. Anomaly detection using support vector machine classification with K-medoids clustering [C] //Proe of the 3rd Asian Himalayas Int Conf on Internet. Piscataway, NJ.. IEEE, 2012..1-5.
  • 9Srinoy S, Kurutach W, Chimphlee W, et al. Intrusion detection via independent component analysis based on rough fuzzy [J]. WSEAS Trans on Computers, 2006, 5(1) :43-48.
  • 10Rose K, Gurewitz E, Fox G C. Constrained clustering as optimization method [J]. IEEE Trans on Pattern Analysis and Machine Intelligence, 1993, /5(8): 785-794.

共引文献224

同被引文献61

引证文献9

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部