• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

深度强化学习生成对抗网络(DRL-GAN):一种用于二进制和多类网络入侵检测的混合方法。

DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection.

作者信息

Strickland Caroline, Zakar Muhammad, Saha Chandrika, Soltani Nejad Sareh, Tasnim Noshin, Lizotte Daniel J, Haque Anwar

机构信息

Department of Computer Science, The University of Western Ontario, London, ON N6A 3K7, Canada.

出版信息

Sensors (Basel). 2024 Apr 25;24(9):2746. doi: 10.3390/s24092746.

DOI:10.3390/s24092746
PMID:38732852
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11086058/
Abstract

Our increasingly connected world continues to face an ever-growing number of network-based attacks. An Intrusion Detection System (IDS) is an essential security technology used for detecting these attacks. Although numerous Machine Learning-based IDSs have been proposed for the detection of malicious network traffic, the majority have difficulty properly detecting and classifying the more uncommon attack types. In this paper, we implement a novel hybrid technique using synthetic data produced by a Generative Adversarial Network (GAN) to use as input for training a Deep Reinforcement Learning (DRL) model. Our GAN model is trained on the NSL-KDD dataset, a publicly available collection of labeled network traffic data specifically designed to support the evaluation and benchmarking of IDSs. Ultimately, our findings demonstrate that training the DRL model on synthetic datasets generated by specific GAN models can result in better performance in correctly classifying minority classes over training on the true imbalanced dataset.

摘要

我们这个日益互联的世界持续面临越来越多基于网络的攻击。入侵检测系统(IDS)是用于检测这些攻击的一项关键安全技术。尽管已经提出了许多基于机器学习的入侵检测系统来检测恶意网络流量,但大多数系统在正确检测和分类较不常见的攻击类型方面存在困难。在本文中,我们实现了一种新颖的混合技术,使用生成对抗网络(GAN)生成的合成数据作为训练深度强化学习(DRL)模型的输入。我们的GAN模型在NSL-KDD数据集上进行训练,该数据集是一个公开可用的带标签网络流量数据集合,专门设计用于支持入侵检测系统的评估和基准测试。最终,我们的研究结果表明,在特定GAN模型生成的合成数据集上训练DRL模型,相较于在真实的不平衡数据集上训练,在正确分类少数类方面能产生更好的性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/11b244be5840/sensors-24-02746-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/9d8eb5ed277d/sensors-24-02746-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/2824cddb2d61/sensors-24-02746-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/fd24d6e3fed9/sensors-24-02746-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/a9ab361986de/sensors-24-02746-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/4a0c090052d9/sensors-24-02746-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/11b244be5840/sensors-24-02746-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/9d8eb5ed277d/sensors-24-02746-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/2824cddb2d61/sensors-24-02746-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/fd24d6e3fed9/sensors-24-02746-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/a9ab361986de/sensors-24-02746-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/4a0c090052d9/sensors-24-02746-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f3e/11086058/11b244be5840/sensors-24-02746-g006.jpg

相似文献

1
DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection.深度强化学习生成对抗网络(DRL-GAN):一种用于二进制和多类网络入侵检测的混合方法。
Sensors (Basel). 2024 Apr 25;24(9):2746. doi: 10.3390/s24092746.
2
Development of a Machine-Learning Intrusion Detection System and Testing of Its Performance Using a Generative Adversarial Network.开发机器学习入侵检测系统并使用生成对抗网络测试其性能。
Sensors (Basel). 2023 Jan 24;23(3):1315. doi: 10.3390/s23031315.
3
Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks.基于分布强化学习和生成对抗网络的工业物联网异常检测。
Sensors (Basel). 2022 Oct 22;22(21):8085. doi: 10.3390/s22218085.
4
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
5
Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles.用于车联网入侵检测系统的多分类与基于树的集成网络
Sensors (Basel). 2023 Oct 28;23(21):8788. doi: 10.3390/s23218788.
6
SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems.SGAN-IDS:基于自注意力机制的对抗入侵检测系统的生成对抗网络。
Sensors (Basel). 2023 Sep 11;23(18):7796. doi: 10.3390/s23187796.
7
Adversarial attacks against supervised machine learning based network intrusion detection systems.对抗攻击对基于监督机器学习的网络入侵检测系统的影响。
PLoS One. 2022 Oct 14;17(10):e0275971. doi: 10.1371/journal.pone.0275971. eCollection 2022.
8
Advancing Network Security with AI: SVM-Based Deep Learning for Intrusion Detection.利用人工智能推进网络安全:基于支持向量机的深度学习用于入侵检测。
Sensors (Basel). 2023 Nov 3;23(21):8959. doi: 10.3390/s23218959.
9
A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection.基于 PSOGWO-优化 BP 神经网络和基于 GA 的特征选择的新型异常入侵检测模型。
Sensors (Basel). 2022 Nov 30;22(23):9318. doi: 10.3390/s22239318.
10
Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques.使用平衡类分布、特征选择和集成机器学习技术优化物联网入侵检测
Sensors (Basel). 2024 Jul 1;24(13):4293. doi: 10.3390/s24134293.

引用本文的文献

1
VAE-WACGAN: An Improved Data Augmentation Method Based on VAEGAN for Intrusion Detection.变分自编码器- Wasserstein对抗生成网络:一种基于变分自编码器-生成对抗网络的改进型入侵检测数据增强方法
Sensors (Basel). 2024 Sep 18;24(18):6035. doi: 10.3390/s24186035.

本文引用的文献

1
ConAnomaly: Content-Based Anomaly Detection for System Logs.ConAnomaly:基于内容的系统日志异常检测。
Sensors (Basel). 2021 Sep 13;21(18):6125. doi: 10.3390/s21186125.