Network intrusion detection method based on improved BYOL self-supervised learning

A technology of network intrusion detection and supervised learning, which is applied in neural learning methods, biological neural network models, and platform integrity maintenance. It can solve problems such as poor detection ability of unknown attacks, premature convergence of genetic algorithms, and high false alarm rate, and achieve optimal BYOL loss function, enhancing various performance indicators, evaluating scientific and comprehensive effects

Pending Publication Date: 2022-05-27
JIANGXI UNIV OF SCI & TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the past, most researchers used pattern matching algorithms to analyze data, and feature selection usually included three schemes, namely filtering methods (such as information gain and correlation coefficient algorithms); encapsulation methods (such as genetic algorithms and particle swarm optimization methods). Algorithm[); embedded methods (such as LASSO regression algorithm), feature extraction uses linear transformation methods, such as principal component analysis (Principal Component Analysis, PCA) and linear discriminant analysis, etc., and nonlinear transformation methods, such as kernel-based method Principal component analysis, etc., but the above methods all have certain defects, for example, the genetic algorithm is prone to premature convergence, and the meaning of each feature dimension of the principal component in the PCA algorithm has certain ambiguity, which is not as strong as the interpretability of the original sample, etc.
[0003] Traditional NIDS also has a lot of problems: poor detection ability for unknown attacks, high false alarm rate, and high resource occupation. In view of the advantages of machine learning algorithms, such as easy understanding and explanation, strong generalization ability, and simple implementation, traditional machine learning Algorithms such as Support Vector Machine (Support Vector Machine, SVM), Decision Tree (Decision Tree, DT) and K Nearest Neighbor algorithm (K Nearest Neighbor) are introduced into the field of intrusion detection to improve the efficiency of intrusion detection, reduce the false negative rate and false positive rate
Although unsupervised learning does not require labeled data, the features learned by unsupervised learning are only applicable to this data set and cannot be transferred to other data sets, which undoubtedly limits the generalization ability of the model.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection method based on improved BYOL self-supervised learning
  • Network intrusion detection method based on improved BYOL self-supervised learning
  • Network intrusion detection method based on improved BYOL self-supervised learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Combine below Figure 1-31 The present invention is further described, but the protection scope of the present invention is not limited to the content.

[0042] In the interest of clarity, not all features of an actual embodiment are described, and in the following description, well-known functions and constructions are not described in detail since they would obscure the invention with unnecessary detail and should be considered in the development of any actual embodiment , a large number of implementation details must be made to achieve the specific goals of the developer, such as changing from one embodiment to another according to the constraints of the relevant system or the relevant business, in addition, it should be considered that such development work may be complex and time-consuming Yes, but it is just routine work for those skilled in the art.

[0043] Table 2 Symbol Explanation

[0044]

[0045]

[0046] like figure 1 As shown, an improved BYOL se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network intrusion detection method for improving BYOL self-supervised learning, and the method comprises the following steps: 1, carrying out the preprocessing of a UNSW-NB15 intrusion detection data set, and carrying out the one-hot coding processing and data normalization processing of character type data; step 2, training an improved BYOL intrusion detection model, and step 3, testing the improved BYOL intrusion detection model, inputting a preprocessed test data set into a feature extraction encoder f theta to obtain a feature representation of each piece of data in the data set, and inputting the feature representation into a classifier to obtain a classification result of each piece of data. The method has the advantages that BoTNet of a multi-head attention mechanism is introduced to suppress features with small contribution to classification in intrusion detection data, and features with large contribution to classification are increased, so that various performance indexes of the model are enhanced; and a BYOL loss function is optimized, so that the model training process is more stable and the convergence speed is accelerated, and the stability and robustness of the model are enhanced.

Description

technical field [0001] The invention relates to a network intrusion detection method for improving BYOL self-supervised learning, and belongs to the technical field of network intrusion detection. Background technique [0002] With the advent of the information age and the popularization of the Internet, all aspects of our lives have undergone great changes. While the Internet has brought us great convenience, it has also brought various network security issues. How to avoid these security problems has become the focus of close attention in the industry. As an important part of the network security system, intrusion detection was first proposed by Anderson, who defined intrusion attempts or threats as: potential, premeditated, unauthorized An attempt to authorize access to information, to manipulate information, and to render the system unreliable or unusable. The earliest intrusion detection model was proposed by Denning. The model mainly generates several contours of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06N3/04G06N3/08
CPCG06F21/55G06N3/08G06N3/045
Inventor 王振东李泽煜王俊岭李大海杨书新
Owner JIANGXI UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products