An Improved Algorithm for Network Intrusion Detection Based on Deep Residual Networks

被引:1
|
作者
Hu, Xuntao [1 ]
Meng, Xiancai [2 ]
Liu, Shaoqing [2 ]
Liang, Lizhen [2 ]
机构
[1] Anhui Univ Sci & Technol, Huainan 232001, Peoples R China
[2] Hefei Comprehens Natl Sci Ctr, Inst Energy, Hefei 230031, Anhui, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Logic gates; Feature extraction; Intrusion detection; Adaptation models; Convolutional neural networks; Residual neural networks; Data models; Long short term memory; Bidirectional control; residual networks; hybrid attention mechanisms; bidirectional long and short memory networks; AUTHORIZATION USAGE CONTROL; SAFETY DECIDABILITY; INTERNET; THINGS;
D O I
10.1109/ACCESS.2024.3398007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of current research will be to increase the accuracy and generalisation capacity of intrusion detection models in order to better handle the complex network security issues of today. In this paper, a new hybrid attention mechanism is introduced along with an enhanced algorithm. Through the effective channel layer and curve space layer, the feature information will be concentrated on the necessary feature information, allowing the model to concentrate more on the features linked to classification and become more broadly applicable. Increase the model's precision. The experimental results demonstrated that the accuracy can achieve 100%, 99.79%, and 98.10% on binary classification problems and 96.37%, 98.12%, and 99.06% on multiclassification problems, respectively, using the UNSW-NB15, CICIDS-2017, and CICIDS-2018 datasets for validation.
引用
收藏
页码:66432 / 66441
页数:10
相关论文
共 50 条
  • [41] Intrusion Detection in IoT Networks Using Deep Learning Algorithm
    Susilo, Bambang
    Sari, Riri Fitri
    INFORMATION, 2020, 11 (05)
  • [42] An Intrusion Detection Algorithm of Dynamic Recursive Deep Belief Networks
    Tian, Jingjing
    Li, Ping'An
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2017), 2017, : 180 - 183
  • [43] Applying an Improved DBSCAN Clustering Algorithm to Network Intrusion Detection
    Yao, Shunyu
    Xu, Hui
    Yan, Lingyu
    Su, Jun
    PROCEEDINGS OF THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 2, 2021, : 865 - 868
  • [44] The XGBoost Tuning by Improved Firefly Algorithm for Network Intrusion Detection
    Jovanovic, Luka
    Jovanovic, Dijana
    Antonijevic, Milos
    Zivkovic, Miodrag
    Budimirovic, Nebojsa
    Strumberger, Ivana
    Bacanin, Nebojsa
    2022 24TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, SYNASC, 2022, : 268 - 275
  • [45] Network intrusion detection technology based on improved C-means clustering algorithm
    Wang, Yanjun
    Journal of Networks, 2013, 8 (11) : 2541 - 2547
  • [46] RETRACTED ARTICLE: Research on network intrusion detection technology based on improved FCMA algorithm
    Hanguang Li
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 103 - 103
  • [47] Network Intrusion Detection Method Based on Hybrid Improved Residual Network Blocks and Bidirectional Gated Recurrent Units
    Yu, Hongchen
    Kang, Chunying
    Xiao, Yao
    Yang, Yuting
    IEEE ACCESS, 2023, 11 : 68961 - 68971
  • [48] Comparison of Shallow and Deep Neural Networks for Network Intrusion Detection
    Kim, Daniel E.
    Gofman, Mikhail
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 204 - 208
  • [49] Deep Learning Network Intrusion Detection Based on Network Traffic
    Wang, Hanyang
    Zhou, Sirui
    Li, Honglei
    Hu, Juan
    Du, Xinran
    Zhou, Jinghui
    He, Yunlong
    Fu, Fa
    Yang, Houqun
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 194 - 207
  • [50] Intrusion detection model based on improved Apriori algorithm
    Zheng XianFeng
    Wang LiYan
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1189 - 1195