• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

改进的长短时记忆网络入侵检测。

An improved long short term memory network for intrusion detection.

机构信息

Department of Computer Science, Faculty of Computers and Informatics, Suez Canal University, Ismailia, Egypt.

Faculty of Information Technology, Misr University for Science and Technology, Egypt.

出版信息

PLoS One. 2023 Aug 1;18(8):e0284795. doi: 10.1371/journal.pone.0284795. eCollection 2023.

DOI:10.1371/journal.pone.0284795
PMID:37527249
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10393181/
Abstract

Over the years, intrusion detection system has played a crucial role in network security by discovering attacks from network traffics and generating an alarm signal to be sent to the security team. Machine learning methods, e.g., Support Vector Machine, K Nearest Neighbour, have been used in building intrusion detection systems but such systems still suffer from low accuracy and high false alarm rate. Deep learning models (e.g., Long Short-Term Memory, LSTM) have been employed in designing intrusion detection systems to address this issue. However, LSTM needs a high number of iterations to achieve high performance. In this paper, a novel, and improved version of the Long Short-Term Memory (ILSTM) algorithm was proposed. The ILSTM is based on the novel integration of the chaotic butterfly optimization algorithm (CBOA) and particle swarm optimization (PSO) to improve the accuracy of the LSTM algorithm. The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. The performance of ILSTM and the intrusion detection system were evaluated using two public datasets (NSL-KDD dataset and LITNET-2020) under nine performance metrics. The results showed that the proposed ILSTM algorithm outperformed the original LSTM and other related deep-learning algorithms regarding accuracy and precision. The ILSTM achieved an accuracy of 93.09% and a precision of 96.86% while LSTM gave an accuracy of 82.74% and a precision of 76.49%. Also, the ILSTM performed better than LSTM in both datasets. In addition, the statistical analysis showed that ILSTM is more statistically significant than LSTM. Further, the proposed ISTLM gave better results of multiclassification of intrusion types such as DoS, Prob, and U2R attacks.

摘要

多年来,入侵检测系统通过发现来自网络流量的攻击并生成报警信号发送给安全团队,在网络安全中发挥了至关重要的作用。支持向量机、K 最近邻等机器学习方法已被用于构建入侵检测系统,但此类系统仍存在准确率低、误报率高的问题。深度学习模型(如长短期记忆网络,LSTM)已被应用于入侵检测系统的设计中,以解决这一问题。然而,LSTM 需要大量的迭代才能达到高性能。本文提出了一种新颖的、改进的长短期记忆(ILSTM)算法。该 ILSTM 基于混沌蝴蝶优化算法(CBOA)和粒子群优化(PSO)的新颖集成,提高了 LSTM 算法的准确性。然后,我们使用 ILSTM 为二进制和多类分类情况构建了一个高效的入侵检测系统。该算法有两个阶段:第一阶段涉及训练一个传统的 LSTM 网络以获得初始权重,第二阶段涉及使用混合群算法 CBOA 和 PSO 来优化 LSTM 的权重以提高准确性。我们使用两个公共数据集(NSL-KDD 数据集和 LITNET-2020)和九个性能指标评估了 ILSTM 和入侵检测系统的性能。结果表明,在准确性和精度方面,所提出的 ILSTM 算法优于原始 LSTM 和其他相关的深度学习算法。ILSTM 的准确率为 93.09%,精度为 96.86%,而 LSTM 的准确率为 82.74%,精度为 76.49%。此外,ILSTM 在两个数据集上的表现都优于 LSTM。此外,统计分析表明,ILSTM 比 LSTM 更具统计学意义。此外,所提出的 ILSTM 对 DoS、Prob 和 U2R 等入侵类型的多分类结果更好。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/1902343ca2af/pone.0284795.g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/5a1f1baab920/pone.0284795.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/ec7d06754f40/pone.0284795.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/a53ee330ebdb/pone.0284795.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/767d5579dc74/pone.0284795.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/e579ccf13693/pone.0284795.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/619f4a55a664/pone.0284795.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/e6f975004f1c/pone.0284795.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/4d7bcab4fe74/pone.0284795.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/8dac60bcbed9/pone.0284795.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/510bea5942dd/pone.0284795.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/a2c9a03e8c66/pone.0284795.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/844b96eda290/pone.0284795.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/28ec48fbb9c8/pone.0284795.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/72417531686c/pone.0284795.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/250a0fe994ee/pone.0284795.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/1902343ca2af/pone.0284795.g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/5a1f1baab920/pone.0284795.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/ec7d06754f40/pone.0284795.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/a53ee330ebdb/pone.0284795.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/767d5579dc74/pone.0284795.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/e579ccf13693/pone.0284795.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/619f4a55a664/pone.0284795.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/e6f975004f1c/pone.0284795.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/4d7bcab4fe74/pone.0284795.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/8dac60bcbed9/pone.0284795.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/510bea5942dd/pone.0284795.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/a2c9a03e8c66/pone.0284795.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/844b96eda290/pone.0284795.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/28ec48fbb9c8/pone.0284795.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/72417531686c/pone.0284795.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/250a0fe994ee/pone.0284795.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f968/10393181/1902343ca2af/pone.0284795.g017.jpg

相似文献

1
An improved long short term memory network for intrusion detection.改进的长短时记忆网络入侵检测。
PLoS One. 2023 Aug 1;18(8):e0284795. doi: 10.1371/journal.pone.0284795. eCollection 2023.
2
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
3
An optimized LSTM-based deep learning model for anomaly network intrusion detection.一种用于异常网络入侵检测的基于长短期记忆网络(LSTM)的优化深度学习模型。
Sci Rep. 2025 Jan 10;15(1):1554. doi: 10.1038/s41598-025-85248-z.
4
Adaptive Anomaly Detection Framework Model Objects in Cyberspace.网络空间中的自适应异常检测框架模型对象
Appl Bionics Biomech. 2020 Dec 9;2020:6660489. doi: 10.1155/2020/6660489. eCollection 2020.
5
A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection.基于 PSOGWO-优化 BP 神经网络和基于 GA 的特征选择的新型异常入侵检测模型。
Sensors (Basel). 2022 Nov 30;22(23):9318. doi: 10.3390/s22239318.
6
Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments.基于人工智能算法的经济可持续性否认攻击检测系统:云计算环境。
Sensors (Basel). 2022 Jun 21;22(13):4685. doi: 10.3390/s22134685.
7
Computational and Mathematical Methods in Medicine Prediction of COVID-19 in BRICS Countries: An Integrated Deep Learning Model of CEEMDAN-R-ILSTM-Elman.计算与数学方法在医学中的应用 金砖国家 COVID-19 预测:CEEMDAN-R-ILSTM-Elman 的集成深度学习模型。
Comput Math Methods Med. 2022 Apr 4;2022:1566727. doi: 10.1155/2022/1566727. eCollection 2022.
8
Computational Intelligence Approaches in Developing Cyberattack Detection System.计算智能方法在开发网络攻击检测系统中的应用。
Comput Intell Neurosci. 2022 Mar 18;2022:4705325. doi: 10.1155/2022/4705325. eCollection 2022.
9
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method.基于 EGA-PSO 和改进随机森林的混合入侵检测模型
Sensors (Basel). 2022 Aug 10;22(16):5986. doi: 10.3390/s22165986.
10
2-BidLSTM: A Feature Driven Intrusion Detection System Based on 2 Statistical Model and Bidirectional LSTM.2-BidLSTM:一种基于 2 个统计模型和双向 LSTM 的特征驱动入侵检测系统。
Sensors (Basel). 2022 Mar 4;22(5):2018. doi: 10.3390/s22052018.

引用本文的文献

1
A DoS attack detection method based on adversarial neural network.一种基于对抗神经网络的拒绝服务攻击检测方法。
PeerJ Comput Sci. 2024 Aug 9;10:e2162. doi: 10.7717/peerj-cs.2162. eCollection 2024.
2
GSB: GNGS and SAG-BiGRU network for malware dynamic detection.GSB:用于恶意软件动态检测的 GNGS 和 SAG-BiGRU 网络。
PLoS One. 2024 Apr 18;19(4):e0298809. doi: 10.1371/journal.pone.0298809. eCollection 2024.
3
Mitotic Nuclei Segmentation and Classification Using Chaotic Butterfly Optimization Algorithm with Deep Learning on Histopathology Images.

本文引用的文献

1
A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach.一种新型混合优化的健壮 CNN 算法在物联网网络入侵检测方法中的应用。
PLoS One. 2022 Dec 1;17(12):e0278493. doi: 10.1371/journal.pone.0278493. eCollection 2022.
2
Novel hybrid firefly algorithm: an application to enhance XGBoost tuning for intrusion detection classification.新型混合萤火虫算法:一种用于增强XGBoost调优以进行入侵检测分类的应用。
PeerJ Comput Sci. 2022 Apr 29;8:e956. doi: 10.7717/peerj-cs.956. eCollection 2022.
3
Deep Stacking Network for Intrusion Detection.
基于混沌蝴蝶优化算法与深度学习的有丝分裂细胞核分割与分类在组织病理学图像中的应用
Biomimetics (Basel). 2023 Oct 5;8(6):474. doi: 10.3390/biomimetics8060474.
深度堆叠网络入侵检测。
Sensors (Basel). 2021 Dec 22;22(1):25. doi: 10.3390/s22010025.
4
How can SHAP values help to shape metabolic stability of chemical compounds?SHAP值如何有助于塑造化合物的代谢稳定性?
J Cheminform. 2021 Sep 27;13(1):74. doi: 10.1186/s13321-021-00542-y.
5
A hybrid feature selection model based on butterfly optimization algorithm: COVID-19 as a case study.一种基于蝴蝶优化算法的混合特征选择模型:以COVID-19为例
Expert Syst. 2022 Mar;39(3):e12786. doi: 10.1111/exsy.12786. Epub 2021 Jul 29.