Journal on Communications ›› 2020, Vol. 41 ›› Issue (11): 160-168.doi: 10.11959/j.issn.1000-436x.2020220
• Papers • Previous Articles Next Articles
Xinglan ZHANG,Shenglin YIN
Revised:
2020-08-18
Online:
2020-11-25
Published:
2020-12-19
Supported by:
CLC Number:
Xinglan ZHANG,Shenglin YIN. Intrusion detection model of random attention capsule network based on variable fusion[J]. Journal on Communications, 2020, 41(11): 160-168.
"
模型 | 验证集 | 测试集 | |||||||
AC | P | R | F1-score | AC | P | R | F1-score | ||
KPCA + SVM | 98.96% | 99.19% | 99.22% | 99.20% | 95.89% | 96.23% | 96.06% | 96.14% | |
KPCA + KNN | 99.33% | 99.34% | 99.36% | 99.35% | 97.81% | 97.38% | 97.89% | 97.63% | |
GBT | 99.40% | 99.46% | 99.47% | 99.47% | 99.29% | 99.23% | 99.25% | 99.24% | |
CNN | 97.80% | 97.82% | 97.82% | 97.82% | 94.69% | 94.70% | 94.72% | 94.71% | |
CNN+ LSTM | 97.88% | 97.99% | 98.03% | 98.01% | 95.01% | 95.98% | 95.99% | 95.98% | |
Vanilla Capsule | 99.18% | 98.89% | 99.19% | 99.04% | 97.29% | 97.30% | 97.31% | 97.30% | |
本文模型 | 99.80% | 99.82% | 99.82% | 99.82% | 99.49% | 99.47% | 99.46% | 99.46% |
"
模型 | 验证集 | 测试集 | |||||||
AC | P | R | F1-score | AC | P | R | F1-score | ||
KPCA + SVM | 98.42% | 90.32% | 96.33% | 93.23% | 95.37% | 94.99% | 95.02% | 95.00% | |
KPCA + KNN | 98.79% | 98.77% | 98.79% | 98.78% | 96.22% | 96.19% | 96.17% | 96.18% | |
GBT | 99.21% | 99.11% | 99.10% | 99.10% | 97.99% | 97.98% | 97.79% | 97.88% | |
CNN | 96.89% | 96.90% | 96.89% | 96.89% | 94.20% | 94.31% | 94.33% | 94.32% | |
CNN + LSTM | 97.73% | 97.70% | 97.71% | 97.70% | 95.65% | 95.34% | 95.34% | 95.34% | |
Vanilla Capsule | 97.89% | 97.83% | 97.86% | 97.84% | 97.47% | 97.43% | 97.45% | 97.44% | |
本文模型 | 99.24% | 99.21% | 99.19% | 99.20% | 98.60% | 98.59% | 98.61% | 98.60% |
[1] | LIAO H J , LIN C H R , LIN Y C ,et al. Intrusion detection system:a comprehensive review[J]. Journal of Network & Computer Applications, 2013,36(1): 16-24. |
[2] | KIM K , AMINANTO M E . Deep learning in intrusion detection perspective:Overview and further challenges[C]// International Workshop on Big Data & Information Security. Piscataway:IEEE Press, 2018: 5-10. |
[3] | TANG T A , MHAMDI L , MCLERNON D ,et al. Deep learning approach for network intrusion detection in software defined networking[C]// International Conference on Wireless Networks & Mobile Communications. Piscataway:IEEE Press, 2016,doi:10.1109/WINCOM.2016.7777224. |
[4] | GU G X , CHEN C T , BUEHLER M J . De novo composite design based on machine learning algorithm[J]. Extreme Mechanics Letters, 2017,18: 19-28. |
[5] | VINAYAKUMAR R , SOMAN K P , POORNACHANDRAN P . Applying convolutional neural network for network intrusion detection[C]// 2017 International Conference on Advances in Computing,Communications and Informatics . Piscataway:IEEE Press, 2017,doi:10.1109/ICACCI.2017.8126009. |
[6] | AL-ZEWAIRI M , ALMAJALI S , AWAJAN A . Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system[C]// The 2017 International Conference on New Trends in Computing Sciences. Piscataway:IEEE Press, 2018: 167-172. |
[7] | VINAYAKUMAR R , ALAZAB M , KP S ,et al. Deep learning approach for intelligent intrusion detection system[J]. IEEE Access, 2019PP(99): 1-1. |
[8] | AZIZJON M , JUMABEK A , KIM W . 1D CNN based network intrusion detection with normalization on imbalanced data[C]// 2020 International Conference on Artificial Intelligence in Information and Communication . Piscataway:IEEE Press, 2020,doi:10.1109/ICAIIC48513.2020.9064976. |
[9] | KIM J , KIM J , THU H L T ,et al. Long short term memory recurrent neural network classifier for intrusion detection[C]// International Conference on Platform Technology & Service. Piscataway:IEEE Press, 2016,doi:10.1109/PlatCon.2016.7456805. |
[10] | CHEN Y , ABRAHAM A , YANG J . Feature selection and intrusion detection using hybrid flexible neural tree[C]// International Symposium on Neural Networks. Berlin:Springer, 2005: 439-444. |
[11] | SABOUR S , FROSST N , HINTON G E . Dynamic routing between capsules[C]// Proceeding of the Neural Information Processing Systems. New York:ACM Press, 2017: 3856-3866. |
[12] | HINTON G E , SABOUR S , FROSST N . Matrix capsules with EM routing[C]// Sixth International Conference on Learning Representations. 2018: 1-9. |
[13] | TAY Y , BAHRI D , METZLER D ,et al. Synthesizer:rethinking self-attention in transformer models[J]. arXiv Preprint,arXiv:2005.00743v1, 2020 |
[14] | TAVALLAEE M , BAGHERI E , LU W ,et al. A detailed analysis of the KDD CUP 99 data set[C]// 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. Piscataway:IEEE Press, 2009: 1-6. |
[15] | DHANABAL L , SHANTHARAJAH S P . A study on NSL-KDD dataset for intrusion detection system based on classification algorithms[J]. International Journal of Advanced Research in Computer and Communication Engineering, 2015,4(6): 446-452. |
[16] | MOUSTAFA N , SLAY J . UNSW-NB15:a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)[C]// Military Communications and Information Systems Conference. Piscataway:IEEE Press, 2015:16. |
[17] | DONG B , WANG X . Comparison deep learning method to traditional methods using for network intrusion detection[C]// IEEE International Conference on Communication Software & Networks. Piscataway:IEEE Press, 2016: 581-585. |
[1] | Dongyu CHEN, Hua CHEN, Limin FAN, Yifang FU, Jian WANG. Research on test strategy for randomness based on deep learning [J]. Journal on Communications, 2023, 44(6): 23-33. |
[2] | Rongpeng LI, Bingyan WANG, Honggang ZHANG, Zhifeng ZHAO. Design of knowledge enhanced semantic communication receiver [J]. Journal on Communications, 2023, 44(6): 70-76. |
[3] | Shuai MA, Ke PEI, Huayan QI, Hang LI, Wen CAO, Hongmei WANG, Hailiang XIONG, Shiyin LI. Research on geomagnetic indoor high-precision positioning algorithm based on generative model [J]. Journal on Communications, 2023, 44(6): 211-222. |
[4] | Xin SUN, Guifu ZHANG, Hongyan XING, Wang Zenghui. Research on intrusion detection for maritime meteorological sensor network based on balancing generative adversarial network [J]. Journal on Communications, 2023, 44(4): 124-136. |
[5] | Jie YANG, Biao DONG, Xue FU, Yu WANG, Guan GUI. Lightweight decentralized learning-based automatic modulation classification method [J]. Journal on Communications, 2022, 43(7): 134-142. |
[6] | Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI. Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF [J]. Journal on Communications, 2022, 43(6): 58-70. |
[7] | Yong LIAO, Shiyi WANG. CSI feedback algorithm based on RM-Net for massive MIMO systems in high-speed mobile environment [J]. Journal on Communications, 2022, 43(5): 166-176. |
[8] | Yurong LIAO, Haining WANG, Cunbao LIN, Yang LI, Yuqiang FANG, Shuyan NI. Research progress of deep learning-based object detection of optical remote sensing image [J]. Journal on Communications, 2022, 43(5): 190-203. |
[9] | Zenghua ZHAO, Yuefan TONG, Jiayang CUI. Device-independent Wi-Fi fingerprinting indoor localization model based on domain adaptation [J]. Journal on Communications, 2022, 43(4): 143-153. |
[10] | Yong LIAO, Gang CHENG, Yujie LI. CSI feedback algorithm based on deep unfolding for massive MIMO systems [J]. Journal on Communications, 2022, 43(12): 77-88. |
[11] | Xueyuan DUAN, Yu FU, Kun WANG, Bin LI. LDoS attack detection method based on simple statistical features [J]. Journal on Communications, 2022, 43(11): 53-64. |
[12] | Junyan HUO, Ruipeng QIU, Yanzhuo MA, Fuzheng YANG. Reference frame list optimization algorithm in video coding by quality enhancement of the nearest picture [J]. Journal on Communications, 2022, 43(11): 136-147. |
[13] | Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN. Method based on contrastive learning for fine-grained unknown malicious traffic classification [J]. Journal on Communications, 2022, 43(10): 12-25. |
[14] | Haiyan KANG, Yuanrui JI. Research on federated learning approach based on local differential privacy [J]. Journal on Communications, 2022, 43(10): 94-105. |
[15] | Hongxia ZHANG, Qi WANG, Dengyue WANG, Ben WANG. Honeypot contract detection of blockchain based on deep learning [J]. Journal on Communications, 2022, 43(1): 194-202. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|