skip to main content
10.1145/3590003.3590018acmotherconferencesArticle/Chapter ViewAbstractPublication PagescacmlConference Proceedingsconference-collections
research-article

An Intrusion Detection Model With Attention and BiLSTM-DNN

Published: 29 May 2023 Publication History

Abstract

Abstract—At present, machine learning and deep learning are often used for network traffic intrusion detection. In order to solve the problem of unfocused feature extraction in these methods and improve the accuracy of network intrusion detection, this paper proposes an intrusion detection model that combines Attention and BiLSTM-DNN(ABD). The model uses Attention to perform preliminary feature extraction on input data, reads the relationship between different features, then uses BiLSTM to extract long-distance dependent features, uses DNN to further extract deep-level features, and finally obtains classification through SoftMax classifier. The comparison experiment uses the NSL_KDD data set, and models such as BiLSTM-DNN, support vector machine, decision tree and random forest are selected as the comparison experiment model. The experimental results show that the accuracy of the ABD is improved by 1.0% and 2.0% on the two-category and five-category tasks, respectively, which verifies the effectiveness of the method.

References

[1]
Yang Yang. 2017. Analysis of Network Security Incident Association Analysis Technology[J].Network Security Technology & Application,2017(08):14+30.
[2]
Kun Zhu, Qi Zhang. 2017. Application of Machine Learning in Network Intrusion Detection,College of Computer Science and Technology,2017,32(03):479-488.
[3]
Qiao Wu. 2020. Application of machine learning in network security intrusion detection[J].Technology Innovation and Application,2020(25):1-4.
[4]
Guo quan Zhang, Wen li Li. 2009. Intrusion detection based on decision tree with mutual information, Journal of Liaoning Technical University(Natural Science), 2009, 2802:273-276.
[5]
Yuan fang Pu, Hong le Du. 2010. Research and Application of Decision Tree in Network Intrusion Detection,Computer Knowledge and Technology, 2010, 607:1560-1563.
[6]
Ming qiu Song, Yun Fu, Gui shi Deng. 2007. Intrusion detection via decision tree and protocol analysis,Application Research of Computers, 2007, 12:171-173, 176.
[7]
Ling Zhang, Jian wei Zhang, Yong xuan Sang, Bo Wang, Ze xiang Hou.2020. Intrusion Detection Algorithm Based on Random Forest and Artificial Immunity[J].Computer Engineering,2020,46(08):146-152.
[8]
Ji jun Guo, Jun hua LI, Chen Chen, Yiming Chen, Yida Lv. 2020. Network Intrusion Detection Method Based on Random Forest[J].Computer Engineering and Applications,2020,56(02):82-88.
[9]
QI Ming-yu, LIU Ming, FU Yan-ming,Research on Network Intrusion Detection Using Support Vector Machines Based on Principal Component Analysis,[J].Netinfo Security,2015(02):15-18.
[10]
Hao Zhang, Jie-Ling Li, Xi-Meng Liu, Chen Dong,Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection,Future Generation Computer Systems,Volume 122,2021,Pages 130-143,
[11]
Guo bin Zeng, Zhao chun Ran. 2017. Based on the study of improving the intrusion detection system of the simple Bayesian algorithm[J].Computer Knowledge and Technology, 2017, 1328:28-29.
[12]
Al-Turaiki, Isra & Altwaijry, Najwa. 2021. A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection. Big Data. 9. 233-252. 10.1089/big.2020.0263.
[13]
Zhen dong Wang, Yao di Liu, Zhong dong Hu, Da hai LI, Jun ling Wang. 2021.Use Improved Grey Wolf Algorithm to Optimize BP Neural Network Intrusion Detection[J]. Journal of Chinese Computer Systems,2021,42(04):875-884.
[14]
Nongmeikapam Brajabidhu Singh, Moirangthem Marjit Singh, Arindam Sarkar, Jyotsna Kumar Mandal. 2021.A novel wide & deep transfer learning stacked GRU framework for network intrusion detection,Journal of Information Security and Applications,Volume 61,2021,102899.
[15]
Minh Tuan Nguyen, Kiseon Kim. 2020.Genetic convolutional neural network for intrusion detection systems,Future Generation Computer Systems,Volume 113,2020,Pages 418-427.
[16]
F. Folino, G. Folino, M. Guarascio, F.S. Pisani, L. Pontieri, 2021. On learning effective ensembles of deep neural networks for intrusion detection,Information Fusion,Volume 72,2021,Pages 48-69.
[17]
Yue feng Liu, Shuang Cai, Han xi Yang, Chen rong Zhang. 2019. Network Intrusion Detection Method Integrating CNN and BiLSTM[J]Computer Engineering,2019,45(12):127-133.
[18]
Pan Wang, Xue hua Song, Chang da Wang, Feng Chen, Xia qang Xu, Guan yu Cai. 2020. Intrusion Detection Method Based on Improved Deep Belief Network[J].Computer Engineering and Applications,2020,56(20):87-92.
[19]
Jing ming Xia, Chun jian Ding, Ling Tan. 2020. Deep belief network intrusion detection method based on grey wolf algorithm[J].Computer Engineering and Design,2020,41(06):1534-1539.
[20]
Hao Shu, Chen Wang, Yin. Shi.2020. Intrusion detection based on BiLSTM and attention mechanism[J].Computer Engineering and Design,2020,41(11):3042-3046.
[21]
Lei Cao, Zhan bin LI, Yong sheng Yang, Long fei Zhao. 2021. Intrusion Detection Method Based on Two-Layer Attention Networks[J].Computer Engineering and Applications,2021,57(19):142-149.
[22]
Tavallaee, Mahbod & Bagheri, Ebrahim & Lu, Wei & Ghorbani, Ali. 2009. A detailed analysis of the KDD CUP 99 data set. IEEE Symposium. Computational Intelligence for Security and Defense Applications, CISDA. 2. 10.1109/CISDA.2009.5356528.
[23]
Xiaodan Zhu, Parinaz Sobhani, and Hongyu Guo. 2015. Long short-term memory over recursive structures. In Proceedings of the 32nd International Conference on International Conference on Machine Learning - Volume 37 (ICML'15). JMLR.org, 1604–1612

Index Terms

  1. An Intrusion Detection Model With Attention and BiLSTM-DNN
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CACML '23: Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning
    March 2023
    598 pages
    ISBN:9781450399449
    DOI:10.1145/3590003
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 May 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Bi-directional long short-term memory
    2. Deep neural network
    3. Multi-head attention
    4. Network intrusion detection

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • This work was supported in part by the Key Project of the National R&D Program of China

    Conference

    CACML 2023

    Acceptance Rates

    CACML '23 Paper Acceptance Rate 93 of 241 submissions, 39%;
    Overall Acceptance Rate 93 of 241 submissions, 39%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 66
      Total Downloads
    • Downloads (Last 12 months)47
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 07 Nov 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media