Network Anomaly Traffic Detection Using WGAN-CNN-BiLSTM in Big Data Cloud-Edge Collaborative Computing Environment

被引:0
|
作者
Wang, Yue [1 ]
机构
[1] Nanyang Inst Technol, Sch Comp & Software, Nanyang, Henan, Peoples R China
来源
关键词
Abnormal Traffic Mining; Big Data; BiLSTM; Cloud-Edge Collaborative Computing; CNN; Wasserstein Generative Adversarial Networks; INTRUSION DETECTION;
D O I
10.3745/JIPS.01.0105
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing architecture has effectively alleviated the computing pressure on cloud platforms, reduced network bandwidth consumption, and improved the quality of service for user experience; however, it has also introduced new security issues. Existing anomaly detection methods in big data scenarios with cloud- edge computing collaboration face several challenges, such as sample imbalance, difficulty in dealing with complex network traffic attacks, and difficulty in effectively training large-scale data or overly complex deeplearning network models. A lightweight deep-learning model was proposed to address these challenges. First, normalization on the user side was used to preprocess the traffic data. On the edge side, a trained Wasserstein generative adversarial network (WGAN) was used to supplement the data samples, which effectively alleviates the imbalance issue of a few types of samples while occupying a small amount of edge-computing resources. Finally, a trained lightweight deep learning network model is deployed on the edge side, and the preprocessed and expanded local data are used to fine -tune the trained model. This ensures that the data of each edge node are more consistent with the local characteristics, effectively improving the system's detection ability. In the designed lightweight deep learning network model, two sets of convolutional pooling layers of convolutional neural networks (CNN) were used to extract spatial features. The bidirectional long short -term memory network (BiLSTM) was used to collect time sequence features, and the weight of traffic features was adjusted through the attention mechanism, improving the model's ability to identify abnormal traffic features. The proposed model was experimentally demonstrated using the NSL-KDD, UNSW-NB15, and CIC-ISD2018 datasets. The accuracies of the proposed model on the three datasets were as high as 0.974, 0.925, and 0.953, respectively, showing superior accuracy to other comparative models. The proposed lightweight deep learning network model has good application prospects for anomaly traffic detection in cloud-edge collaborative computing architectures.
引用
收藏
页码:375 / 390
页数:16
相关论文
共 50 条
  • [1] Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment
    Gao, Jing
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [2] TCN-based Lightweight Log Anomaly Detection in Cloud-edge Collaborative Environment
    Chen, Jining
    Chong, Weitu
    Yu, Siyu
    Xu, Zhun
    Tan, Chaohong
    Chen, Ningjiang
    [J]. 2022 TENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA, CBD, 2022, : 13 - 18
  • [3] Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing
    Moustafa, Nour
    Creech, Gideon
    Sitnikova, Elena
    Keshk, Marwa
    [J]. 2017 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2017,
  • [4] A Network Intrusion Security Detection Method Using BiLSTM-CNN in Big Data Environment
    Wang, Hong
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2023, 19 (05): : 688 - 701
  • [5] A collaborative cloud-edge computing framework in distributed neural network
    Xu, Shihao
    Zhang, Zhenjiang
    Kadoch, Michel
    Cheriet, Mohamed
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [6] A collaborative cloud-edge computing framework in distributed neural network
    Shihao Xu
    Zhenjiang Zhang
    Michel Kadoch
    Mohamed Cheriet
    [J]. EURASIP Journal on Wireless Communications and Networking, 2020
  • [7] Design of the Network Traffic Anomaly Detection System in Cloud Computing Environment
    Zhang, Long
    Wang, Jinsong
    Lin, Sheng
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 16 - 19
  • [8] Resource Allocation Strategy Using Deep Reinforcement Learning in Cloud-Edge Collaborative Computing Environment
    Cen, Junjie
    Li, Yongbo
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [9] A smart surface inspection system using faster R-CNN in cloud-edge computing environment
    Wang, Yuanbin
    Liu, Minggao
    Zheng, Pai
    Yang, Huayong
    Zou, Jun
    [J]. ADVANCED ENGINEERING INFORMATICS, 2020, 43 (43)
  • [10] Track Signal Intrusion Detection Method Based on Deep Learning in Cloud-Edge Collaborative Computing Environment
    Zhong, Yaojun
    Zhong, Shuhai
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2023, 32 (15)