[1]李奕蒙,高玉琢*.基于膨胀卷积与BiLSTM的入侵检测模型[J].计算机技术与发展,2024,34(07):87-92.[doi:10.20165/j.cnki.ISSN1673-629X.2024.0099]
 LI Yi-meng,GAO Yu-zhuo*.A Network Intrusion Detection Model Based on Dilated Convolution Network and BiLSTM[J].,2024,34(07):87-92.[doi:10.20165/j.cnki.ISSN1673-629X.2024.0099]
点击复制

基于膨胀卷积与BiLSTM的入侵检测模型

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
34
期数:
2024年07期
页码:
87-92
栏目:
网络空间安全
出版日期:
2024-07-10

文章信息/Info

Title:
A Network Intrusion Detection Model Based on Dilated Convolution Network and BiLSTM
文章编号:
1673-629X(2024)07-0087-06
作者:
李奕蒙高玉琢*
宁夏大学 信息工程学院,宁夏 银川 750021
Author(s):
LI Yi-mengGAO Yu-zhuo*
School of Information Engineering,Ningxia University,Yinchuan 750021,China
关键词:
网络安全入侵检测膨胀卷积网络双向长短记忆网络特征提取
Keywords:
network securityintrusion detectiondilated convolution networkbidirectional long short memory networkfeature extraction
分类号:
TP393.0
DOI:
10.20165/j.cnki.ISSN1673-629X.2024.0099
摘要:
针对基于深度学习的入侵检测系统存在局部特征提取效果不佳,提取维度单一,预测精度有待提高和模型计算开 销过高等问题,提出了一种基于膨胀卷积网络(Dilated Convolution Network,DCN)与双向长短记忆网络(Bidirectional Long Short Memory Network ,BiLSTM)的入侵检测模型。 首先使用改进的三层膨胀卷积神经网络(Dilated Convolution Network,DCN)结构进行局部特征提取,解决了局部特征提取效果不佳、提取维度单一的问题;其次使用将膨胀卷积与 BiLSTM 相结合的办法解决预测精度有待提高的问题;最后通过在模型中引入分组卷积技术使模型轻量化,解决了计算开销过高的问题。 在公开数据集 CICIDS2017 上进行了实验,经过对比传统模型以及现有的入侵检测方法表明,所提模型拥有较好的性能。 模型预测准确率、召回率、F1 值较高,证明了其有效性和可行性。
Abstract:
Aiming at the problems of the intrusion detection system based on deep learning,such as poor local feature extraction effect,single extraction dimension,prediction accuracy to be improved and high cost of model calculation,an intrusion detection model based on Dilated Convolutional Network (DCN) and Bidirectional Long Short Memory Network (BiLSTM) is proposed. Firstly,an improved three-layer DCN structure was used for local feature extraction,which solved the problem of poor local feature extraction performance and single extraction dimension. Secondly,the method combining expansion convolution with BiLSTM was used to solve the problem that the prediction accuracy needs to be improved. Finally,grouping convolution technology was introduced into the model to make the model lightweight, which solves the problem of high computational cost. The experiments were conducted on the public dataset CICIDS2017. After comparing traditional models with existing intrusion detection methods, the proposed model has excellent performance. The high prediction accuracy,recall rate,and F1 value of the proposed model demonstrate its effectiveness and feasibility.

相似文献/References:

[1]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(07):143.
[2]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
 MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(07):151.
[3]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(07):148.
[4]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
 LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(07):254.
[5]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
 LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(07):162.
[6]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(07):170.
[7]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
 LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(07):168.
[8]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
 HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(07):179.
[9]汪世义.基于优化支持向量机的网络入侵检测技术研究[J].计算机技术与发展,2009,(07):177.
 WANG Shi-yi.Network Intrusion Detection Based on Improved Support Vector Machine[J].,2009,(07):177.
[10]严华 蔡瑞英.即时通信监控系统的设计与实现[J].计算机技术与发展,2009,(07):242.
 YAN Hua,CAI Rui-ying.Design and Implementation of Monitoring System of Instant Messaging[J].,2009,(07):242.
[11]李生 邓一贵 唐学文 潘磊 林玉香.基于移动代理的分布式入侵检测系统的研究[J].计算机技术与发展,2009,(09):132.
 LI Sheng,DENG Yi-gui,TANG Xue-wen,et al.Research of Mobile Agent - Based Distributed Intrusion Detection System[J].,2009,(07):132.
[12]邵晓宇 杨善林 褚伟.基于Linux入侵检测动态防火墙的设计与实现[J].计算机技术与发展,2008,(05):156.
 SHAO Xiao-yu,YANG Shan-lin,CHU Wei.Design and Implementation of Dynamic Intrusion Detection Firewall Based on Linux[J].,2008,(07):156.
[13]李守国 李俊.基于数据挖掘的入侵检测系统设计[J].计算机技术与发展,2006,(04):212.
 LI Shou-guo,LI Jun.Design of Data Mining Based Intrusion Detection System[J].,2006,(07):212.
[14]陈建锐 何增颖 梁永成.IPv6网络入侵检测系统设计[J].计算机技术与发展,2010,(09):123.
 CHEN Jian-rui,HE Zeng-ying,LIANG Yong-cheng.Design of Network Intrusion Detection System on IPv6[J].,2010,(07):123.
[15]王峰 宗平.面向混合入侵检测策略的应用模型研究[J].计算机技术与发展,2011,(07):149.
 WANG Feng,ZONG Ping.Study of Mixed Model Oriented Intrusion Detection[J].,2011,(07):149.
[16]李建 李杰 孙燕花.基于聚类融合的入侵检测[J].计算机技术与发展,2011,(10):250.
 LI Jian,LI Jie,SUN Yan-hua.An Intrusion Detection Based on Clustering Ensemble[J].,2011,(07):250.
[17]谢振国 凌捷.网络安全预警系统的研究[J].计算机技术与发展,2011,(11):250.
 XIE Zhen-guo,LING Jie.Study of a Network Security and Early-Warning System[J].,2011,(07):250.
[18]陈剑,蔡龙征.一种无监督异常入侵检测的簇异常度量方法[J].计算机技术与发展,2013,(04):131.
 CHEN Jian,CAI Long-zheng.A Cluster Anomaly Measure Approach for Unsupervised Anomaly Intrusion Detection[J].,2013,(07):131.
[19]姜参,王大伟.一种改进蚁群聚类的入侵检测方法[J].计算机技术与发展,2013,(12):139.
 JIANG Shen,WANG Da-wei.An Improved Ant Colony Clustering Method for Intrusion Detection[J].,2013,(07):139.
[20]张公让,万飞. 基于网格搜索的 SVM 在入侵检测中的应用[J].计算机技术与发展,2016,26(01):97.
 ZHANG Gong-rang,WAN Fei. Application of Support Vector Machine in Network Intrusion Detection Based on Grid Search[J].,2016,26(07):97.

更新日期/Last Update: 2024-07-10