期刊文献+

变分自编码器和注意力机制的异常入侵检测方法 被引量:3

Anomaly intrusion detection method based on variational autoencoder and attention mechanism
下载PDF
导出
摘要 针对传统的机器学习算法在检测未知攻击方面表现不佳的问题,提出了一种基于变分自动编码器和注意力机制的异常入侵检测方法,通过将变分自编码器和注意力机制相结合,实现使用深度学习方法从基于流量的数据中检测异常网络流量的目标。所提方法利用独热编码和归一化技术对输入数据进行预处理;将数据输入到基于注意力机制的变分编码器中,采集训练样本中隐含特征信息,并将其融入最终潜变量中;计算原始数据与重建数据之间的重建误差,进而基于适当的阈值判断流量的异常情况。实验结果表明,与其他入侵检测方法相比,所提方法明显改善了入侵检测的精度,不仅可以检测已知和未知攻击,而且还可以提高低频次攻击的检测率。 Aiming at the poor performance of traditional machine learning algorithms in detecting unknown attacks,an anomaly intrusion detection method based on variational autoencoder and attention mechanism is proposed.By combining the variational autoencoder and attention mechanism,the method realizes the goal of using deep learning method to detect abnormal network traffic from traffic based data.The proposed method is divided into two parts:data preprocessing and anomaly detection.Specifically,the input data is preprocessed by using the one-hot encoding and normalization technology.Then,the data is input into the variational encoder based on the attention mechanism,and the hidden feature information in the training samples is collected and integrated into the final latent variable.Finally,the reconstruction error between the original data and the reconstruction data is calculated,and then the abnormal flow is judged based on the appropriate threshold.Experimental results show that,compared with other intrusion detection methods,the proposed model significantly improves the accuracy of intrusion detection,which can not only detect known and unknown attacks,but also improve the detection rate of low-frequency attacks.
作者 施媛波 SHI Yuanbo(Kunming City College,Kunming 650106,P.R.China)
机构地区 昆明城市学院
出处 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2022年第6期1071-1078,共8页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 云南省教育厅科学研究基金(2019J1048,2019J1042)。
关键词 网络入侵检测 异常检测 变分自编码器 注意力机制 network intrusion detection anomaly detection variational autoencoder attention mechanism
  • 相关文献

参考文献5

二级参考文献33

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:231
  • 2Dhanalakshmi Y,Babu I R. Intrusion Detection U-sing Data Mining Along Fuzzy Logic and GeneticAlgorithms[J]. Int J Comput Sci,2008,(2):27.
  • 3El-Khatib K. Impact of Feature Reduction on theEfficiency of Wireless Intrusion Detection Systems[J], IEEE Trans Parall Distr, 2010,21(8):1143.
  • 4Gao M,Tian J, Xia M. Intrusion Detection MethodBased On Classify Support Vector Machine[J]. In-tell Comput Tech Autom, 2009(2) :391.
  • 5Hu W. Online Adaboost-Based ParameterizedMethods for Dynamic Distributed Network IntrusionDetection [ J]. IEEE Trans Cybernet, 2014,44(1):66.
  • 6Yang F,Mao K Z. Robust feature selection for mi-croarray data based on multicriterion fusion. [J].IEEE/ACM Trans Computat Biol, 2011, 8(4):1080.
  • 7Stolfo S. KDD cup 1999 dataset [EB/OL]. (1999-02-23). [2014-10-28], http://kdd. ics. uci. edu/da-tabases/kddcup99/task. html.
  • 8杨晓宾,梁刚,胡晓勤.基于ARMA的并行入侵检测的负载均衡算法[J].四川大学学报(自然科学版),2011,48(1):80-86. 被引量:3
  • 9杨弢,陈文.一种基于多分类器协同训练的网络异常检测方法[J].四川大学学报(自然科学版),2012,49(2):329-334. 被引量:3
  • 10廖红文,周德龙.AdaBoost及其改进算法综述[J].计算机系统应用,2012,21(5):240-244. 被引量:24

共引文献56

同被引文献21

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部