计算机科学 ›› 2019, Vol. 46 ›› Issue (10): 173-179.doi: 10.11896/jsjkx.180801429
丁红卫, 万良, 周康, 龙廷艳, 辛壮
DING Hong-wei, WAN Liang, ZHOU Kang, LONG Ting-yan, XIN Zhuang
摘要: 当今网络数据呈现出更为庞大、复杂和多维的特性。传统的基于机器学习的方法在面临高维数据特征时需要手动提取大量特征,特征提取过程复杂且计算量大,达不到入侵检测的准确性和实时性的要求。深度学习在处理复杂数据方面具有较好的优势,可以自动从数据中提取更好的表示特征。为此,文中创新性地提出了一种基于深度卷积神经网络的入侵检测方法。首先,提出了一种将网络数据转换为图像的方法;然后,针对转换之后的图像设计了一个深度卷积神经网络模型,该模型使用两层的卷积层和池化层对图像进行降维处理,并引入了Relu函数作为新的非线性激活来代替传统的神经网络中常用的Sigmoid或Tanh函数,以加快网络的收敛速度,且该模型引入了Dropout方法来防止网络模型发生过度拟合的现象;最后,通过构建完成的深度卷积神经网络模型对转换之后的图像进行训练和识别。实验结果表明,与已有方法相比,所提方法具有更好的检测准确率、更低的误报率和更快的检测速率。
中图分类号:
[1]ASHFAQ R A R,WANG X Z,HUANG Z X,et al.Fuzziness based semi-supervised learning approach forintrusion detection system[J].Information Sciences,2017,378(C):484-497. [2]QING S H,JIANG J C,MA H T,et al.Research on intrusion detection technique:a survey[J].Journal on Communications,2004,25(7):19-29.(in Chinese) 卿斯汉,蒋建春,马恒太,等.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. [3]ROY S S,MITTAL D,BASU A,et al.Stock market forecasting using LASSO linear regression model[C]//Afro-European Conference for Industrial Advancement.Cham:Springer,2015:371-381. [4]BASU A,ROY S S,ABRAHAM A.A Novel Diagnostic Approach Based on SupportVector Machine with Linear Kernel for Classifying the Erythemato-Squamous Disease[C]//InternationalConference on Computing Communication Controland Automation.New York:IEEE Press,2015:343-347. [5]ROY S S,VISWANATHAM V M.Classifying Spam Emails Using Artificial Intelligent Techniques[J].International Journal of Engineering Research in Africa,2016,22:152-161. [6]TAN B,TAN Y,LI Y.Research on Intrusion Detection System Based on Improved PSO-SVM Algorithm[J].Chemical Engineering Transaction,2016,51:583-588. [7]MITTAL D,GAURAV D,ROY S S.An effective hybridized-classifier for breast cancer diagnosis[C]//IEEE International Conference on Advanced Intelligent Mechatronics.New York:IEEE Press,2015:1026-1031. [8]HINTON G E,SALAKHUTDINOV R R.Reducing the Dimen-sionality of Data with Neural Networks[J].Science,2006,313(5786):504-507. [9]ROY S S,MALLIK A,GULATI R,et al.A deep learning based artificial neural network approach for intrusion detection[C]//International Conference on Mathematics and Computing.Singapore:Springer,2017:44-53. [10]YIN C,ZHU Y,FEI J,et al.A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks[J].IEEE Access,2017,5(99):21954-21961. [11]ALOM M Z,BONTUPALLI V R,TAHA T M.Intrusion detection using deep belief networks[C]//Aerospace and Electronics Conference.New York:IEEE Press,2016:339-344. [12]JAVAID A,NIYAZ Q,SUN W,et al.A Deep Learning Ap-proach for Network Intrusion Detection System[C]//Eai International Conference on Bio-Inspired Information and Communications Technologies.Pittsburgh:ICST,2016:21-26. [13]POTLURI S,DIEDRICH C.Accelerated deep neural networks for enhanced Intrusion Detection System[C]//IEEE,International Conference on Emerging Technologies and Factory Automation.New York:IEEE Press,2016. [14]YU Y,LONG J,CAI Z.Session-Based Network IntrusionDetection Using a Deep Learning Architecture[M]//Modeling Decisions for Artificial Intelligence.Berlin:Springer Netherlands,2017:144-155. [15]KWON D,KIM H,KIM J,et al.A survey of deep learning-based network anomaly detection[J].Cluster Computing,2017(5):1-13. [16]WANG M,LI J.Network Intrusion Detection Model Based on Convolutional Neural Network[J].Journal of Information Security Research,2017,3(11):990-994.(in Chinese) 王明,李剑.基于卷积神经网络的网络入侵检测系统[J].信息安全研究,2017,3(11):990-994. [17]TAVALLAEE M,BAGHERI E,LU W,et al.A detailed analysis of the KDD CUP 99 data set[C]//IEEE International Conference on Computational Intelligence for Security & Defense Applications.New York:IEEE,2009:1-6. [18]SZARVAS M,YOSHIZAWA A,YAMAMOTO M,et al.Pedestrian detection with convolutional neural networks[C]//Intelligent Vehicles Symposium.New York:IEEE Press,2005:224-229. [19]KRIZHEVSKY A,SUTSKEVER I,HINTON G E.ImageNet classification with deep convolutional neural networks[C]//International Conference on Neural Information Processing Systems.New York:IEEE Press,2012:1097-1105. [20]ZHANG Y L,ZHANG Z Q,WU H T,et al.Perimeter intrusion detection method based on improved convolution neural network[J].Computer Science,2017,44(3):182-186.(in Chinese) 张永良,张智勤,吴鸿韬,等.基于改进卷积神经网络的周界入侵检测方法[J].计算机科学,2017,44(3):182-186. [21]CHEN L,QU H,ZHAO J,et al.Efficient and robust deep lear-ning with Correntropy-induced loss function[J].Neural Com-puting & Applications,2016,27(4):1019-1031. [22]SADEK R A,SOLIMAN M S,ELSAYED H S.Effective Anoma-ly Intrusion Detection System based on Neural Network with Indicator Variable and Rough set Reduction[J].International Journal of Computer Science Issues,2013,10(6):227-233. [23]KUANG F,XU W,ZHANG S.A novel hybrid KPCA and SVM with GA model for intrusion detection[J].Applied Soft Computing Journal,2014,18(C):178-184. [24]YIN C,ZHU Y,FEI J,et al.A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks[J].IEEE Access,2017,5(99):21954-21961. [25]GAO N,GAO L,HE Y Y.Deep belief nets model oriented to intrusion detection system[J].Systems Engineering and Electro-nices,2016,38(9):2201-2207.(in Chinese) 高妮,高岭,贺毅岳.面向入侵检测系统的Deep Belief Nets模型[J].系统工程与电子技术,2016,38(9):2201-2207. |
[1] | 饶志双, 贾真, 张凡, 李天瑞. 基于Key-Value关联记忆网络的知识图谱问答方法 Key-Value Relational Memory Networks for Question Answering over Knowledge Graph 计算机科学, 2022, 49(9): 202-207. https://doi.org/10.11896/jsjkx.220300277 |
[2] | 汤凌韬, 王迪, 张鲁飞, 刘盛云. 基于安全多方计算和差分隐私的联邦学习方案 Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy 计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108 |
[3] | 周乐员, 张剑华, 袁甜甜, 陈胜勇. 多层注意力机制融合的序列到序列中国连续手语识别和翻译 Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion 计算机科学, 2022, 49(9): 155-161. https://doi.org/10.11896/jsjkx.210800026 |
[4] | 徐涌鑫, 赵俊峰, 王亚沙, 谢冰, 杨恺. 时序知识图谱表示学习 Temporal Knowledge Graph Representation Learning 计算机科学, 2022, 49(9): 162-171. https://doi.org/10.11896/jsjkx.220500204 |
[5] | 李宗民, 张玉鹏, 刘玉杰, 李华. 基于可变形图卷积的点云表征学习 Deformable Graph Convolutional Networks Based Point Cloud Representation Learning 计算机科学, 2022, 49(8): 273-278. https://doi.org/10.11896/jsjkx.210900023 |
[6] | 王剑, 彭雨琦, 赵宇斐, 杨健. 基于深度学习的社交网络舆情信息抽取方法综述 Survey of Social Network Public Opinion Information Extraction Based on Deep Learning 计算机科学, 2022, 49(8): 279-293. https://doi.org/10.11896/jsjkx.220300099 |
[7] | 王馨彤, 王璇, 孙知信. 基于多尺度记忆残差网络的网络流量异常检测模型 Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network 计算机科学, 2022, 49(8): 314-322. https://doi.org/10.11896/jsjkx.220200011 |
[8] | 郝志荣, 陈龙, 黄嘉成. 面向文本分类的类别区分式通用对抗攻击方法 Class Discriminative Universal Adversarial Attack for Text Classification 计算机科学, 2022, 49(8): 323-329. https://doi.org/10.11896/jsjkx.220200077 |
[9] | 姜梦函, 李邵梅, 郑洪浩, 张建朋. 基于改进位置编码的谣言检测模型 Rumor Detection Model Based on Improved Position Embedding 计算机科学, 2022, 49(8): 330-335. https://doi.org/10.11896/jsjkx.210600046 |
[10] | 陈泳全, 姜瑛. 基于卷积神经网络的APP用户行为分析方法 Analysis Method of APP User Behavior Based on Convolutional Neural Network 计算机科学, 2022, 49(8): 78-85. https://doi.org/10.11896/jsjkx.210700121 |
[11] | 朱承璋, 黄嘉儿, 肖亚龙, 王晗, 邹北骥. 基于注意力机制的医学影像深度哈希检索算法 Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism 计算机科学, 2022, 49(8): 113-119. https://doi.org/10.11896/jsjkx.210700153 |
[12] | 孙奇, 吉根林, 张杰. 基于非局部注意力生成对抗网络的视频异常事件检测方法 Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection 计算机科学, 2022, 49(8): 172-177. https://doi.org/10.11896/jsjkx.210600061 |
[13] | 檀莹莹, 王俊丽, 张超波. 基于图卷积神经网络的文本分类方法研究综述 Review of Text Classification Methods Based on Graph Convolutional Network 计算机科学, 2022, 49(8): 205-216. https://doi.org/10.11896/jsjkx.210800064 |
[14] | 侯钰涛, 阿布都克力木·阿布力孜, 哈里旦木·阿布都克里木. 中文预训练模型研究进展 Advances in Chinese Pre-training Models 计算机科学, 2022, 49(7): 148-163. https://doi.org/10.11896/jsjkx.211200018 |
[15] | 周慧, 施皓晨, 屠要峰, 黄圣君. 基于主动采样的深度鲁棒神经网络学习 Robust Deep Neural Network Learning Based on Active Sampling 计算机科学, 2022, 49(7): 164-169. https://doi.org/10.11896/jsjkx.210600044 |
|