Computer Science ›› 2021, Vol. 48 ›› Issue (3): 327-332.doi: 10.11896/jsjkx.200600025

• Information Security • Previous Articles    

Intrusion Detection Method Based on Borderline-SMOTE and Double Attention

LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei   

  1. School of Computer and Information Technology,Shanxi University,Taiyuan 030006,China
  • Received:2020-06-03 Revised:2020-10-04 Online:2021-03-15 Published:2021-03-05
  • About author:LIU Quan-ming,born in 1973,senior engineer,associate professor.His main research interests include network industry analysis and cloud security.
  • Supported by:
    National Natural Science Foundation of China(61673295) and Shanxi Provincial International Science and Technology Cooperation Key R&D Program Project(201903D421050).

Abstract: With the development of Internet,the network environment is becoming more complex,and the resulting network security problems continue to emerge,so the protection of network security becomes an important research topic.Aiming at the problems of unbalanced traffic data collected in real network environment and inaccurate feature representation extracted by traditional machine learning methods,this paper proposes an intrusion detection method based on Borderline-SMOTE and dual attention.Firstly,this method performs Borderline-SMOTE oversampling on the intrusion data to solve the problem of data imbalance,and uses the advantages of convolutional networks for image feature extraction to convert 1D flow data into grayscale images.Then it updates the low-dimensional features from the channel dimension and the spatial dimension to obtain a more accurate feature representation respectively.Finally,it uses the Softmax classifier to classify and predict traffic data.The simulation experiments of the proposed method have been verified on the NSL-KDD data set,and the accuracy reaches 99.24%.Compared with other commonly used methods,it has a higher accuracy.

Key words: Borderline-SMOTE, Double Attention, Intrusion detection, Network security, Unbalanced problems

CLC Number: 

  • TP181
[1]KIM J,KIM J,THU H L,et al.Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection[C]//International Conference on Platform Technology and Service.2016:1-5.
[2]SHON T,MOON J.A hybrid machine learning approach to network anomaly detection[J].Information Sciences,2007,177(18):3799-3821.
[3]TAN B,TAN Y,LI Y X,et al.Research on Intrusion Detection System Based on Improved Pso-svm Algorithm[J].Chemical Engineering Transactions,2016:583-588.
[4]ZHAO Y H.Research on intrusion detection Optimization Algorithm based on SVM active learning[J].Journal of Jingchu University of Technology,2018,33(4):5-9.
[5]REN J D,LIU X Q,WANG Q,et al.An Multi-Level Intrusion Detection Method Based on KNN Outlier Detection and Random Forests[J].Journal of Computer Research and Development,2019,56(3):566-575.
[6]SCHMIDHUBER J.Deep learning in neural networks:An overview[J].Neural Networks,2015,61:85-117.
[7]RAFF E,SYLVESTER J,NICHOLAS C,et al.Learning the PE Header,Malware Detection with Minimal Domain Knowledge[J].Machine Learning,2017:121-132.
[8]SHI L Y,ZHU H Q,LIU Y H,et al.Intrusion Detection of Industrial Control System Based on Correlation Information Entropy and CNN-BiLSTM[J].Journal of Computer Research and Development,2019,56(11):2330-2338.
[9]WANG M,LI J.Network Intrusion Detection Model Based on Convolutional Neural Network[J].Journal of Information Security Research,2017,3(11):990-994.
[10]PHETLASY S,OHZAHATA S,WU C,et al.ApplyingSMOTE for a Sequential Classifiers Combination Method to Improve the Performance of Intrusion Detection System[C]//Dependable Autonomic and Secure Computing.2019:255-258.
[11]DING H W,WAN L,LONG T Y.Research on the application of deep auto-encoder network in intrusion detection[J].Journal of Harbin Institute of Technology,2019,51(5):185-194.
[12]HUI H,WANG W Y,MAO B H.Borderline-SMOTE:a newover-sampling method in imbalanced data sets learning[C]//International Conference on Intelligent Computing.Berlin,Heidelberg:Springer,2005.
[13]MNIH V,HEESS N ,GRAVES A ,et al.Recurrent Models of Visual Attention[J].arXiv:1406.6247v1,2014.
[14]WOO S,PARK J,LEE J,et al.CBAM:Convolutional Block Attention Module[C]//European Conference on Computer Vision.2018:3-19.
[15]PHETLASY S,OHZAHATA S,WU C,et al.ApplyingSMOTE for a Sequential Classifiers Combination Method to Improve the Performance of Intrusion Detection System[C]//Dependable Autonomic and Secure Computing.2019:255-258.
[16]LI Y,ZHANG B.An Intrusion DetectionAlgorithm Based onDeep CNN[J].Computer Applications and Software,2020,37(4):324-328.
[17]DING H W,WAN L,ZHOU K,et al.Study on Intrusion Detection Based on Deep Convolution Neural Network[J].Computer Science,2019,46(10):173-179.
[18]LIAN H F,ZHANG H,GUO W Z.Netflow Anomaly Detection Based on Data Enhancement and Hybrid Neural Network [J].Journal of Chinese Mini-Micro Computer Systems,2020,41(4):786-793.
[19]YANG Y,ZHENG K,WU C,et al.Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks[J].Applied Sciences,2019,9(2):238.
[20]THASEEN I S,KUMAR C A.Intrusion detection model using fusion of chi-square feature selection and multi class SVM[J].Journal of King Saud University-Computer and Information Sciences,2017,29(4):462-472.
[21]PARSAEI M R,ROSTAMI S M,JAVIDAN R,et al.A Hybrid Data Mining Approach for Intrusion Detection on Imbalanced NSL-KDD Dataset[J].International Journal of Advanced Computer Science and Applications,2016,7(6):20-25.
[22]YANG Y R,SONG R J,ZHOU Z Y.Network Intrusion Detection Method Based on GAN-PSO-ELM[J].Computer Enginee-ring and Applications,2020,56(12):66-72.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[3] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[4] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[5] DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108.
[6] ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570.
[7] CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587.
[8] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[9] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[10] ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351.
[11] LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54.
[12] CHENG Xi, CAO Xiao-mei. SQL Injection Attack Detection Method Based on Information Carrying [J]. Computer Science, 2021, 48(7): 70-76.
[13] CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463.
[14] CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497.
[15] YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523.
Full text



No Suggested Reading articles found!