• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

GSOOA-1DDRSN:基于深度残差收缩网络的网络流量异常检测

GSOOA-1DDRSN: Network traffic anomaly detection based on deep residual shrinkage networks.

作者信息

Zuo Fengqin, Zhang Damin, Li Lun, He Qing, Deng Jiaxin

机构信息

College of Big Data and Information Engineering, Guizhou University, Guiyang, 550025, China.

出版信息

Heliyon. 2024 May 29;10(11):e32087. doi: 10.1016/j.heliyon.2024.e32087. eCollection 2024 Jun 15.

DOI:10.1016/j.heliyon.2024.e32087
PMID:38868050
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11168389/
Abstract

One of the critical technologies to ensure cyberspace security is network traffic anomaly detection, which detects malicious attacks by analyzing and identifying network traffic behavior. The rapid development of the network has led to explosive growth in network traffic, which seriously impacts the user's information security. Researchers have delved into intrusion detection as an active defense technology to address this challenge. However, traditional machine learning methods struggle to capture complex threats and attack patterns when dealing with large-scale network data. In contrast, deep learning methods have the advantages of automatically extracting features from network traffic data and strong generalization capabilities. Aiming to enhance the ability of network anomaly traffic detection, this paper proposes a network traffic anomaly detection based on Deep Residual Shrinkage Network (DRSN), namely "GSOOA-1DDRSN". This method uses an improved Osprey optimization algorithm to select the most relevant and essential features in network traffic, reducing the features' dimensionality. For better detection performance of network traffic anomalies, a one-dimensional deep residual shrinkage network (1DDRSN) is designed as a classifier. Validation is performed using the NSL-KDD and UNSW-NB15 datasets and compared with other methods. The experimental results show that GSOOA-1DDRSN has improved multi-classification accuracy, precision, recall, and F1 Score by approximately 2 % and 3 %, respectively, compared to the 1DDRSN model on two datasets. Additionally, it reduces the time computation costs by 20 % and 30 % on these datasets. Furthermore, compared to other models, GSOOA-1DDRSN offers superior classification accuracy and effectively reduces the number of features.

摘要

确保网络空间安全的关键技术之一是网络流量异常检测,它通过分析和识别网络流量行为来检测恶意攻击。网络的快速发展导致网络流量呈爆炸式增长,这严重影响了用户的信息安全。研究人员深入研究入侵检测作为一种主动防御技术来应对这一挑战。然而,传统机器学习方法在处理大规模网络数据时难以捕捉复杂的威胁和攻击模式。相比之下,深度学习方法具有从网络流量数据中自动提取特征和强大泛化能力的优势。为了提高网络异常流量检测能力,本文提出了一种基于深度残差收缩网络(DRSN)的网络流量异常检测方法,即“GSOOA-1DDRSN”。该方法使用改进的鱼鹰优化算法在网络流量中选择最相关和最关键的特征,降低特征维度。为了更好地检测网络流量异常,设计了一维深度残差收缩网络(1DDRSN)作为分类器。使用NSL-KDD和UNSW-NB15数据集进行验证,并与其他方法进行比较。实验结果表明,与两个数据集上的1DDRSN模型相比,GSOOA-1DDRSN的多分类准确率、精确率、召回率和F1分数分别提高了约2%和3%。此外,它在这些数据集上的时间计算成本降低了20%和30%。此外,与其他模型相比,GSOOA-1DDRSN具有更高的分类准确率,并有效减少了特征数量。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/9a507dc3f252/gr15.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/21b9470be456/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/1783e72657c5/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/62cb82260621/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/ca221bdef0e5/gr4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/b0bf66c2674d/gr5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/fe6ef520cfb1/gr6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/ef0581143088/gr7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/a4ca91fefa83/gr8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/9612bf0e4788/gr9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/f2687817264c/gr10.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/b947d265737e/gr11.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/c9170649fcb1/gr12.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/5b134df4c36e/gr14.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/9a507dc3f252/gr15.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/21b9470be456/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/1783e72657c5/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/62cb82260621/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/ca221bdef0e5/gr4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/b0bf66c2674d/gr5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/fe6ef520cfb1/gr6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/ef0581143088/gr7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/a4ca91fefa83/gr8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/9612bf0e4788/gr9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/f2687817264c/gr10.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/b947d265737e/gr11.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/c9170649fcb1/gr12.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/5b134df4c36e/gr14.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/878a/11168389/9a507dc3f252/gr15.jpg

相似文献

1
GSOOA-1DDRSN: Network traffic anomaly detection based on deep residual shrinkage networks.GSOOA-1DDRSN:基于深度残差收缩网络的网络流量异常检测
Heliyon. 2024 May 29;10(11):e32087. doi: 10.1016/j.heliyon.2024.e32087. eCollection 2024 Jun 15.
2
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
3
Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis.基于深度神经网络和关联分析的恶意网络流量检测。
Sensors (Basel). 2020 Mar 6;20(5):1452. doi: 10.3390/s20051452.
4
A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection.基于卷积神经网络的改进型异常网络入侵检测。
Big Data. 2021 Jun;9(3):233-252. doi: 10.1089/big.2020.0263.
5
Adaptive Anomaly Detection Framework Model Objects in Cyberspace.网络空间中的自适应异常检测框架模型对象
Appl Bionics Biomech. 2020 Dec 9;2020:6660489. doi: 10.1155/2020/6660489. eCollection 2020.
6
Multiresolution dendritic cell algorithm for network anomaly detection.用于网络异常检测的多分辨率树突状细胞算法。
PeerJ Comput Sci. 2021 Oct 19;7:e749. doi: 10.7717/peerj-cs.749. eCollection 2021.
7
Research on Anomaly Network Detection Based on Self-Attention Mechanism.基于自注意力机制的异常网络检测研究。
Sensors (Basel). 2023 May 25;23(11):5059. doi: 10.3390/s23115059.
8
A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection.基于 PSOGWO-优化 BP 神经网络和基于 GA 的特征选择的新型异常入侵检测模型。
Sensors (Basel). 2022 Nov 30;22(23):9318. doi: 10.3390/s22239318.
9
DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic.文档 ID:一种基于深度学习的网络流量特征提取和异常检测方法。
Sensors (Basel). 2022 Jun 10;22(12):4405. doi: 10.3390/s22124405.
10
Anomalous Network Traffic Detection Method Based on an Elevated Harris Hawks Optimization Method and Gated Recurrent Unit Classifier.基于提升型哈里斯鹰优化算法和门控循环单元分类器的异常网络流量检测方法。
Sensors (Basel). 2022 Oct 5;22(19):7548. doi: 10.3390/s22197548.

本文引用的文献

1
RamanCMP: A Raman spectral classification acceleration method based on lightweight model and model compression techniques.拉曼CMP:一种基于轻量级模型和模型压缩技术的拉曼光谱分类加速方法。
Anal Chim Acta. 2023 Oct 16;1278:341758. doi: 10.1016/j.aca.2023.341758. Epub 2023 Aug 28.
2
A new bio-inspired metaheuristic algorithm for solving optimization problems based on walruses behavior.一种基于海象行为的新的仿生元启发式算法,用于解决优化问题。
Sci Rep. 2023 May 31;13(1):8775. doi: 10.1038/s41598-023-35863-5.
3
Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis.
基于深度神经网络和关联分析的恶意网络流量检测。
Sensors (Basel). 2020 Mar 6;20(5):1452. doi: 10.3390/s20051452.