Time sequence related network intrusion detection method based on attention mechanism

A technology of network intrusion detection and intrusion detection, which is applied in the direction of data exchange network, neural learning method, biological neural network model, etc. It can solve the problems of long training time, inability to balance detection accuracy and training speed, and large computing overhead , to achieve the effect of shortening training and testing time, retaining the original characteristics of data, and high classification accuracy

Active Publication Date: 2020-12-15
BEIJING JIAOTONG UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The disadvantage of a network intrusion detection scheme using deep learning methods in the above-mentioned prior art is that network intrusion can be regarded as a time-series-related event, and this scheme ignores the influence of the length of data history information on model performance, which is not very good. Balance the detection accuracy and training speed, the accuracy rate is too low, the false positive rate is too high, the training time is too long, and the calculation overhead is too large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time sequence related network intrusion detection method based on attention mechanism
  • Time sequence related network intrusion detection method based on attention mechanism
  • Time sequence related network intrusion detection method based on attention mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0036]Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be underst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a time sequence related network intrusion detection method based on an attention mechanism. The method comprises the the steps of training an SSAE network by using an intrusiondetection data set to obtain trained network flow data to be classified, and performing one-hot coding and standardization processing on the network flow data to be classified to obtain preprocessed network flow data; and inputting the preprocessed network flow data into a classifier based on an attention mechanism of the trained laminated sparse auto-encoder SSAE network, and carrying out classification processing on the network flow data to be classified by the classifier to obtain a network intrusion detection result of the network flow data to be classified. According to the method, a double-layer Bi-GRU network structure added with an attention mechanism is designed as a classifier, so that the method has relatively high classification accuracy and relatively low false alarm rate, andmeanwhile, the training and testing time of the model is greatly shortened.

Description

technical field [0001] The invention relates to the technical field of network attack detection, in particular to a timing-related network intrusion detection method based on an attention mechanism. Background technique [0002] With the rapid development of the Internet in recent years, various forms of network attacks emerge in an endless stream. How to effectively detect abnormal behaviors and attack types has become an important topic in the field of network security. NIDS (network intrusion detection system, network intrusion detection system) refers to the combination of hardware and software to detect behaviors that endanger the security of computer systems, such as collecting vulnerability information, resulting in denial of access and access to system control beyond the statutory authority. NIDS mainly includes three functional components: information source, analysis engine and response component. The information source is responsible for collecting various infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24G06K9/62G06N3/04G06N3/08
CPCH04L63/1416H04L63/20H04L41/142G06N3/08G06N3/045G06F18/24G06F18/24323G06F18/214
Inventor 汪静怡陈乃月李浥东金一曹原周汉
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products