• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用MS1DCNN和Transformer增强工业控制系统的入侵检测以解决数据不平衡问题

Enhanced Intrusion Detection for ICS Using MS1DCNN and Transformer to Tackle Data Imbalance.

作者信息

Zhang Yuanlin, Zhang Lei, Zheng Xiaoyuan

机构信息

School of Artificial Intelligence and Data Science, Hebei University of Technology, Tianjin 300132, China.

出版信息

Sensors (Basel). 2024 Dec 10;24(24):7883. doi: 10.3390/s24247883.

DOI:10.3390/s24247883
PMID:39771622
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11678987/
Abstract

With the escalating threat posed by network intrusions, the development of efficient intrusion detection systems (IDSs) has become imperative. This study focuses on improving detection performance in programmable logic controller (PLC) network security while addressing challenges related to data imbalance and long-tail distributions. A dataset containing five types of attacks targeting programmable logic controllers (PLCs) in industrial control systems (ICS) was first constructed. To address class imbalance and challenges posed by complex network traffic, Synthetic Minority Oversampling Technique (SMOTE) and Borderline-SMOTE were applied to oversample minority classes, thereby enhancing their diversity. This paper proposes a dual-channel feature extraction model that integrates a multi-scale one-dimensional convolutional neural network (MS1DCNN) and a Weight-Dropped Transformer (WDTransformer) for IDS. The MS1DCNN is designed to extract fine-grained temporal features from packet-level data, whereas the WDTransformer leverages self-attention mechanisms to capture long-range dependencies and incorporates regularization techniques to mitigate overfitting. To further enhance performance on long-tail distributions, a custom combined loss function was developed by integrating cross-entropy loss and focal loss to reduce misclassification in minority classes. Experimental validation on the constructed dataset demonstrated that the proposed model achieved an accuracy of 95.11% and an F1 score of 95.12%, significantly outperforming traditional machine learning and deep learning models.

摘要

随着网络入侵带来的威胁不断升级,开发高效的入侵检测系统(IDS)变得势在必行。本研究专注于提高可编程逻辑控制器(PLC)网络安全中的检测性能,同时解决与数据不平衡和长尾分布相关的挑战。首先构建了一个包含针对工业控制系统(ICS)中可编程逻辑控制器(PLC)的五种攻击类型的数据集。为了解决类别不平衡以及复杂网络流量带来的挑战,应用了合成少数类过采样技术(SMOTE)和边界合成少数类过采样技术(Borderline-SMOTE)对少数类进行过采样,从而增强其多样性。本文提出了一种用于入侵检测系统的双通道特征提取模型,该模型集成了多尺度一维卷积神经网络(MS1DCNN)和权重下降变压器(WDTransformer)。MS1DCNN旨在从数据包级数据中提取细粒度的时间特征,而WDTransformer利用自注意力机制来捕捉长距离依赖关系,并采用正则化技术来减轻过拟合。为了进一步提高在长尾分布上的性能,通过整合交叉熵损失和焦点损失开发了一种定制的组合损失函数,以减少少数类中的误分类。在构建的数据集上进行的实验验证表明,所提出的模型实现了95.11%的准确率和95.12%的F1分数,显著优于传统机器学习和深度学习模型。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/4fe7746425e7/sensors-24-07883-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/00b50c01653c/sensors-24-07883-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/5317661828b0/sensors-24-07883-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/cf7a6f46721d/sensors-24-07883-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/486288caa3b7/sensors-24-07883-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/8d645d238036/sensors-24-07883-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/4cbb79ed5614/sensors-24-07883-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/9fcbc57561a4/sensors-24-07883-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/8a7997eeeb15/sensors-24-07883-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/4fe7746425e7/sensors-24-07883-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/00b50c01653c/sensors-24-07883-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/5317661828b0/sensors-24-07883-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/cf7a6f46721d/sensors-24-07883-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/486288caa3b7/sensors-24-07883-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/8d645d238036/sensors-24-07883-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/4cbb79ed5614/sensors-24-07883-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/9fcbc57561a4/sensors-24-07883-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/8a7997eeeb15/sensors-24-07883-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b44c/11678987/4fe7746425e7/sensors-24-07883-g009.jpg

相似文献

1
Enhanced Intrusion Detection for ICS Using MS1DCNN and Transformer to Tackle Data Imbalance.使用MS1DCNN和Transformer增强工业控制系统的入侵检测以解决数据不平衡问题
Sensors (Basel). 2024 Dec 10;24(24):7883. doi: 10.3390/s24247883.
2
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
3
Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles.用于车联网入侵检测系统的多分类与基于树的集成网络
Sensors (Basel). 2023 Oct 28;23(21):8788. doi: 10.3390/s23218788.
4
Towards an Effective Intrusion Detection Model Using Focal Loss Variational Autoencoder for Internet of Things (IoT).基于焦点损失变分自动编码器的物联网(IoT)有效入侵检测模型。
Sensors (Basel). 2022 Aug 4;22(15):5822. doi: 10.3390/s22155822.
5
ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.ROAST-IoT:一种用于物联网网络入侵检测的新型距离优化注意力卷积散射技术。
Sensors (Basel). 2023 Sep 23;23(19):8044. doi: 10.3390/s23198044.
6
Network intrusion detection using oversampling technique and machine learning algorithms.使用过采样技术和机器学习算法的网络入侵检测
PeerJ Comput Sci. 2022 Jan 7;8:e820. doi: 10.7717/peerj-cs.820. eCollection 2022.
7
MammoViT: A Custom Vision Transformer Architecture for Accurate BIRADS Classification in Mammogram Analysis.MammoViT:一种用于乳房X光检查分析中准确的BIRADS分类的定制视觉Transformer架构。
Diagnostics (Basel). 2025 Jan 25;15(3):285. doi: 10.3390/diagnostics15030285.
8
Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques.使用平衡类分布、特征选择和集成机器学习技术优化物联网入侵检测
Sensors (Basel). 2024 Jul 1;24(13):4293. doi: 10.3390/s24134293.
9
Dual-hybrid intrusion detection system to detect False Data Injection in smart grids.用于检测智能电网中虚假数据注入的双混合入侵检测系统。
PLoS One. 2025 Jan 27;20(1):e0316536. doi: 10.1371/journal.pone.0316536. eCollection 2025.
10
The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems.数据集失衡对 SCADA 入侵检测系统性能的影响。
Sensors (Basel). 2023 Jan 9;23(2):758. doi: 10.3390/s23020758.

本文引用的文献

1
Research on Adaptive 1DCNN Network Intrusion Detection Technology Based on BSGM Mixed Sampling.基于 BSGM 混合采样的自适应 1DCNN 网络入侵检测技术研究。
Sensors (Basel). 2023 Jul 6;23(13):6206. doi: 10.3390/s23136206.