A Network Intrusion Security Detection Method Using BiLSTM-CNN in Big Data Environment

被引:0
|
作者
Wang, Hong [1 ]
机构
[1] Sichuan Modern Vocat Coll, Sch Elect & Informat, Chengdu 610207, Peoples R China
来源
关键词
Big Data; BiLSTM; CNN; Feature Selection; Network Intrusion Detection; FEATURE-EXTRACTION; DETECTION SYSTEM; INTERNET;
D O I
10.3745/JIPS.01.0097
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The conventional methods of network intrusion detection system (NIDS) cannot measure the trend of intrusion detection targets effectively, which lead to low detection accuracy. In this study, a NIDS method which based on a deep neural network in a big-data environment is proposed. Firstly, the entire framework of the NIDS model is constructed in two stages. Feature reduction and anomaly probability output are used at the core of the two stages. Subsequently, a convolutional neural network, which encompasses a down sampling layer and a characteristic extractor consist of a convolution layer, the correlation of inputs is realized by introducing bidirectional long short-term memory. Finally, after the convolution layer, a pooling layer is added to sample the required features according to different sampling rules, which promotes the overall performance of the NIDS model. The proposed NIDS method and three other methods are compared, and it is broken down under the conditions of the two databases through simulation experiments. The results demonstrate that the proposed model is superior to the other three methods of NIDS in two databases, in terms of precision, accuracy, F1 score, and recall, which are 91.64%, 93.35%, 92.25%, and 91.87%, respectively. The proposed algorithm is significant for improving the accuracy of NIDS.
引用
收藏
页码:688 / 701
页数:14
相关论文
共 50 条
  • [41] A Novel Industrial Intrusion Detection Method based on Threshold-optimized CNN-BiLSTM-Attention using ROC Curve
    Lan, Mindi
    Luo, Jun
    Chai, Senchun
    Chai, Ruiqi
    Zhang, Chen
    Zhang, Baihai
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7384 - 7389
  • [42] A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
    Ya Qin
    Guo-wei Shen
    Wen-bo Zhao
    Yan-ping Chen
    Miao Yu
    Xin Jin
    Frontiers of Information Technology & Electronic Engineering, 2019, 20 : 872 - 884
  • [43] A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
    Qin, Ya
    Shen, Guo-wei
    Zhao, Wen-bo
    Chen, Yan-ping
    Yu, Miao
    Jin, Xin
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (06) : 872 - 884
  • [44] Network security threat detection under big data by using machine learning
    He, Jinbao
    Yang, Jie
    Ren, Kangjian
    Zhang, Wenjing
    Li, Guiquan
    International Journal of Network Security, 2019, 21 (05): : 768 - 773
  • [45] Edge Perception Temporal Data Anomaly Detection Method Based on BiLSTM-Attention in Smart City Big Data Environment
    Xia, Bin
    Zhou, Jun
    Kong, Fanyu
    Yang, Jiarui
    Lin, Lin
    Wu, Xin
    Xie, Qiong
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2024, 33 (12)
  • [46] Security detection of network intrusion: application of cluster analysis method
    Yang, W. H.
    COMPUTER OPTICS, 2020, 44 (04) : 660 - 664
  • [47] Modeling and Prediction of Network Security Situation in Big Data Environment
    Li Jingfu
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 3037 - 3043
  • [48] Intrusion Detection Model of CNN-BiLSTM Algorithm Based on Mean Control
    Zhang, Liangkang
    Huang, Jingyu
    Zhang, Yanfeng
    Zhang, Guidong
    PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020), 2020, : 22 - 27
  • [49] Network security Mode analysis based on big data environment
    Xu, Shuning
    2020 INTERNATIONAL CONFERENCE ON BIG DATA & ARTIFICIAL INTELLIGENCE & SOFTWARE ENGINEERING (ICBASE 2020), 2020, : 50 - 53
  • [50] Research on Network Security Visualization under Big Data Environment
    Yang, Tingting
    Jia, Shuwen
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 660 - 662