期刊文献+

基于Transformer和胶囊网络的信息传输系统入侵检测方法 被引量:4

Intrusion Detection of Electronic Information System Based on Transformer and Capsule Network
下载PDF
导出
摘要 文中研究了信息传输系统安全性预测方法来提升信息系统的安全性防护,并提出一种基于Transformer和胶囊网络的信息传输系统入侵检测方法(Transformer-CapsNet,TCNet)。首先,利用Transformer提取电子传输信息系统访问域名字符串的全局编码信息,并借助Encoder提供的注意力模块提高模型的特征抽取能力;然后,利用路由算法改进胶囊网络,缓解父、子胶囊之间的信息传递冗余,同时利用改进的胶囊网络获取域名字符串在深层空间中的局部信息;最后,在多个对信息系统访问的合法域名和多个新变种或新出现的小样本家族恶意域名数据集上进行测试。结果表明,相比当前主流模型,在二分类和多分类检测任务上表现良好。 Research the security prediction method of the information transmission system to improve the security protection of the information system.An Intrusion detection of electronic information system based on Transformer and Capsule Network(Transformer-CapsNet,TCNet)is proposed.Transformer is first used to extract the global encoder information of the domain name string accessed by the electronic transmission information system,and the attention module of the encoder is used to improve the feature extraction ability of the model.Then,the routing algorithm is used to improve the capsule network to alleviate the redundancy of information transfer between parent and child capsules,and the improved capsule network is used to obtain the local information of domain name string in the deep space.Finally,normal domain names of the electronic information system and several new variants or newly emerged family malicious domain names are used to test the proposed model.The results show that the proposed model performs well in binary and multi-classification detection tasks compared with the current mainstream models.
作者 康凯 马伟 王治学 张宏武 KANG Kai;MA Wei;WANG Zhi-xue;ZHANG Hong-wu(Ningxia Normal University,Guyuan 756000,China;Ningxia University,Yinchuan 750021,China)
出处 《中国电子科学研究院学报》 北大核心 2022年第9期862-868,共7页 Journal of China Academy of Electronics and Information Technology
基金 宁夏产教融合人才培养示范专业项目(2018SFZY29) 宁夏高等学院科学研究项目(NGY2020114)。
关键词 电子信息系统入侵检测 TRANSFORMER 胶囊网络 域名字符串 路由算法 intrusion detection of electronic information system transformer capsule network domain name string routing algorithm
  • 相关文献

参考文献15

二级参考文献76

  • 1ROSSOW C, DIETRICH C, BOS H. Detection of intrusions and malware, and vulnerability assessment[M]. Berlin: Springer, 2013.
  • 2MAHMOUD M, NIR M, MATRAWY A. A survey on botnet architec-tures, detection and defences[J]. International Journal of Network Se-curity, 2015, 17(3): 272-289.
  • 3PU Y, CHEN X, CUI X, et al. Data stolen trojan detection based on network behaviors[J]. Procedia Computer Science, 2013, 17: 828-835.
  • 4NIRMAL K, JANET B, KUMAR R. Phishing-the threat that still exists[C]//International Conference on Computing and Communica-tions Technologies(ICCCT). IEEE, 2015: 139-143.
  • 5CHEN C M, CHENG S T, CHOU J H. Detection of fast-flux domains[J]. Journal of Advances in Computer Networks, 2013, 1(2): 148-152.
  • 6VANIA J, MENIYA A, JETHVA H B. A review on botnet and detec-tion technique[J]. International Journal of Computer Trends and Tech-nology, 2013, 4(1): 23-29.
  • 7KHATTAK S, RAMAY N R, KHAN K R, et al. A taxonomy of botnet behavior, detection and defense[J]. Communications Surveys & Tuto-rials, IEEE, 2014, 16(2): 898-924.
  • 8GARCíA S, UHLí? V, REHAK M. Identifying and modeling botnet C&C behaviors[C]//The 1st International Workshop on Agents and Cyber Security. ACM, 2014.
  • 9YADAV S, REDDY A K K, REDDY A L, et al. Detecting algorithmi-cally generated malicious domain names[C]//The 10th ACM SIG-COMM Conference on Internet Measurement. Melbourne, Australia, 2010: 48-61.
  • 10FELEGYHAZI M, KREIBICH C, PAXSON V. On the potential of proactive domain blacklisting[C]//The 3rd USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More. San Jose, CA, USA, 2010.

共引文献118

同被引文献37

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部