Computer Science ›› 2023, Vol. 50 ›› Issue (11A): 230300142-8.doi: 10.11896/jsjkx.230300142

• Information Security • Previous Articles     Next Articles

Study on Intrusion Detection Algorithm Based on TCN-BiLSTM

BAI Wanrong1, WEI Feng1, ZHENG Guangyuan2, WANG Baohui2   

  1. 1 State Grid Gansu Electric Power Research Institute,Lanzhou 730070,China
    2 School of Software,Beihang University,Beijing 100191,China
  • Published:2023-11-09
  • About author:BAI Wanrong,born in 1985,postgra-duate,senior engineer,is a member of China Computer Federation.His main research interests include network security and machine learning.
    ZHENG Guangyuan,born in 1996,M.S.His main research interests include artificial intelligence and network security.
  • Supported by:
    Research Project of Multi-source Network Threat Tracing Technology Based on Post-protection(52272222001B).

Abstract: Network security is directly related to national security.How to accurately and efficiently detect network threats in the power grid is very important.Aiming at the problems of small receptive field and no consideration of data timing characteristics of traditional CNN,combined with spatial and temporal characteristics of network traffic data,an attention intrusion detection algorithm based on time convolution network(TCN) and BiLSTM is proposed.First,feature coding is performed on network traffic characteristics.Then the forest optimization feature screening algorithm is used to reduce the redundancy of the data,and then resampling is carried out to solve the problem of data imbalance.Finally,the data is input into the deep neural network,and the processed data is extracted by the TCN and BiLSTM networks for feature learning.The self-attention mechanism is used for weight allocation,and finally the classification is carried out to realize the intrusion detection.The data set adopts NSL-KDD,and the experimental results show that the algorithm can identify network intrusion detection effectively.

Key words: Intrusion detection, Temporal convolutional network, Bi-directional long short-term memory

CLC Number: 

  • TN915.08
[1]NIKOLOVA E,JECHEVA V.Some similarity coefficients andapplication of data mining techniques to the anomalybased IDS[J].Telecommunication Systems,2012,50(2):127-135.
[2]ALAZAB A,ABAWAJY J,HOBBS M,et al.Crime toolkits:the productisation of cybercrime[C]// IEEE.IEEE,2013:1626-1632.
[3]XIAO L,CHEN Y,CHANG C K.Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion Detection[C]//Computer Software & Applications Conference Workshops.IEEE,2014.
[4]JING X Y,BI Y,DENG H.An innovative two-stage fuzzykNN-DST classifier for unknown intrusion detection[J].International Arab Journal of Information Technology,2016,13(4):359-366.
[5]OHKI T,GUPTA V,NISHIGAKI M.Efficient Spoofing Attack Detection against Unknown Sample using End-to-End Anomaly Detection[C]//Asia-Pacific Signal and Information Processing Association Annual Summit and Conference(APSIPA ASC).2019.
[6]ALSAADI H I,ALMUTTAIRIR M,BAYAT O,et al.Computational Intelligence Algorithms to Handle Dimensionality Reduction for Enhancing Intrusion Detection System [J].Journal of Information Science andEngineering 2020,36:293-308.
[7]TANG C F,BULI N,AI Z.Research on networkintrusion detection based on LightGBM[J].Computer Applications and Software,2022,39(8):298-311.
[8]YU Y,LIU G,YAN H,et al.Attention-based BiLSTM modelfor anoma- lous HTTP traffic detection[C]//15th International Conference on Service Systems and Service Management.2018:1-6.
[9]TAN M,IACOVAZZI A,CHEUNG N M M,et al.A neural attention model for real-time network intrusion detection[C]//2019 IEEE 44th Conference on Local Computer Networks.2019:291-299.
[10]AHSAN M,NYGARD K E.Convolutional neural networkswith LSTM for intrusion detection[C]// Proceeding of 35th International Conference on Computers and Their Applications.2020:69-79.
[11]GURUNG S,GHOSE M K,SUBEDI A.Deep learning approach on network intrusion detection system using NSL-KDD dataset[J].International Journal of Computer Network and Information Security,2019,11(3):8-14.
[12]HSU C M,HSIEH H Y,PRAKOSA S W,et al.Using longshort term memory based convolutional neural networks for network intrusion detection[C]//International Wireless Internet Conference.2018:86-94.
[13]GHAEMI M,FEIZI-DERAKHSHI M R.Forest optimization algorithm[J].Expert Systems with Applications,2014,41(15):6676-6687.
[14]CHU B,LI Z S,ZHANG M L,et al.Research onImprovements ofFeature Selection Using Forest Optimization Algorithm[J].Journal of Software,2018,29(9):2545-2558.
[15]BAI S,KOLTER J Z,KOLTUN V.An empirical evaluation of generic convolutionalandrecurrent networks for sequence mode-ling[J].arXiv:1803.01271,2018.
[1] YANG Pengfei, CAI Ruijie, GUO Shichen, LIU Shengli. Container-based Intrusion Detection Method for Cisco IOS-XE [J]. Computer Science, 2023, 50(4): 298-307.
[2] LI Haitao, WANG Ruimin, DONG Weiyu, JIANG Liehui. Semi-supervised Network Traffic Anomaly Detection Method Based on GRU [J]. Computer Science, 2023, 50(3): 380-390.
[3] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[4] ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570.
[5] CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587.
[6] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[7] PAN Zhi-hao, ZENG Bi, LIAO Wen-xiong, WEI Peng-fei, WEN Song. Interactive Attention Graph Convolutional Networks for Aspect-based Sentiment Classification [J]. Computer Science, 2022, 49(3): 294-300.
[8] WANG Jue, LU Bin, ZHU Yue-fei. Generation and Application of Adversarial Network Traffic:A Survey [J]. Computer Science, 2022, 49(11A): 211000039-11.
[9] SONG Mei-qi, FU Xiang-ling, YAN Chen-wei, WU Wei-qiang, REN Yun. Prediction Model of Enterprise Resilience Based on Bi-directional Long Short-term Memory Network [J]. Computer Science, 2022, 49(11): 197-205.
[10] WANG Lu, WEN Wu-song. Study on Distributed Intrusion Detection System Based on Artificial Intelligence [J]. Computer Science, 2022, 49(10): 353-357.
[11] ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351.
[12] LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54.
[13] CHENG Xi, CAO Xiao-mei. SQL Injection Attack Detection Method Based on Information Carrying [J]. Computer Science, 2021, 48(7): 70-76.
[14] CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463.
[15] YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!