• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于卷积柯尔莫哥洛夫-阿诺德网络的入侵检测模型。

An intrusion detection model based on Convolutional Kolmogorov-Arnold Networks.

作者信息

Wang Zhen, Zainal Anazida, Siraj Maheyzah Md, Ghaleb Fuad A, Hao Xue, Han Shaoyong

机构信息

School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou, 325035, Zhejiang, China.

Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Johor, 81310, Malaysia.

出版信息

Sci Rep. 2025 Jan 14;15(1):1917. doi: 10.1038/s41598-024-85083-8.

DOI:10.1038/s41598-024-85083-8
PMID:39809850
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11733237/
Abstract

The application of artificial neural networks (ANNs) can be found in numerous fields, including image and speech recognition, natural language processing, and autonomous vehicles. As well, intrusion detection, the subject of this paper, relies heavily on it. Different intrusion detection models have been constructed using ANNs. While ANNs are relatively mature to construct intrusion detection models, some challenges remain. Among the most notorious of these are the bloated models caused by the large number of parameters, and the non-interpretability of the models. Our paper presents Convolutional Kolmogorov-Arnold Networks (CKANs), which are designed to overcome these difficulties and provide an interpretable and accurate intrusion detection model. Kolmogorov-Arnold Networks (KANs) are developed from the Kolmogorov-Arnold representation theorem. Meanwhile, CKAN incorporates a convolutional computational mechanism based on KAN. The model proposed in this paper is constructed by incorporating attention mechanisms into CKAN's computational logic. The datasets CICIoT2023 and CICIoMT2024 were used for model training and validation. From the results of evaluating the performance indicators of the experiments, the intrusion detection model constructed based on CKANs has an attractive application prospect. As compared with other methods, the model can predict a much higher level of accuracy with significantly fewer parameters. However, it is not superior in terms of memory usage, execution speed and energy consumption.

摘要

人工神经网络(ANNs)的应用见于众多领域,包括图像与语音识别、自然语言处理以及自动驾驶车辆。同样,本文的主题——入侵检测,也严重依赖于它。人们已使用人工神经网络构建了不同的入侵检测模型。虽然人工神经网络在构建入侵检测模型方面相对成熟,但仍存在一些挑战。其中最突出的是大量参数导致的模型臃肿,以及模型的不可解释性。我们的论文提出了卷积柯尔莫哥洛夫 - 阿诺德网络(CKANs),旨在克服这些困难,并提供一个可解释且准确的入侵检测模型。柯尔莫哥洛夫 - 阿诺德网络(KANs)是基于柯尔莫哥洛夫 - 阿诺德表示定理开发的。同时,CKAN在KAN的基础上融入了卷积计算机制。本文提出的模型是通过将注意力机制纳入CKAN的计算逻辑构建而成的。数据集CICIoT2023和CICIoMT2024用于模型训练和验证。从实验性能指标评估结果来看,基于CKANs构建的入侵检测模型具有诱人的应用前景。与其他方法相比,该模型能用显著更少的参数预测出更高的准确率。然而,它在内存使用、执行速度和能耗方面并不占优。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/e843684710f1/41598_2024_85083_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/617d39e7f5a6/41598_2024_85083_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/4defb3e019ae/41598_2024_85083_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/e7617f342ba8/41598_2024_85083_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/9c1709772203/41598_2024_85083_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/1e357d8490df/41598_2024_85083_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/b795bb942dc7/41598_2024_85083_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/713df022c9fb/41598_2024_85083_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/fe6a6f2bc255/41598_2024_85083_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/d278602aba02/41598_2024_85083_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/d3b552c83ba8/41598_2024_85083_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/fe5d118f0886/41598_2024_85083_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/12a15ba1c31e/41598_2024_85083_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/f7abf6926e64/41598_2024_85083_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/4ece024f1247/41598_2024_85083_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/e843684710f1/41598_2024_85083_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/617d39e7f5a6/41598_2024_85083_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/4defb3e019ae/41598_2024_85083_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/e7617f342ba8/41598_2024_85083_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/9c1709772203/41598_2024_85083_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/1e357d8490df/41598_2024_85083_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/b795bb942dc7/41598_2024_85083_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/713df022c9fb/41598_2024_85083_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/fe6a6f2bc255/41598_2024_85083_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/d278602aba02/41598_2024_85083_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/d3b552c83ba8/41598_2024_85083_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/fe5d118f0886/41598_2024_85083_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/12a15ba1c31e/41598_2024_85083_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/f7abf6926e64/41598_2024_85083_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/4ece024f1247/41598_2024_85083_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bf5f/11733237/e843684710f1/41598_2024_85083_Fig15_HTML.jpg

相似文献

1
An intrusion detection model based on Convolutional Kolmogorov-Arnold Networks.一种基于卷积柯尔莫哥洛夫-阿诺德网络的入侵检测模型。
Sci Rep. 2025 Jan 14;15(1):1917. doi: 10.1038/s41598-024-85083-8.
2
Kolmogorov-Arnold networks for genomic tasks.用于基因组任务的柯尔莫哥洛夫-阿诺德网络。
Brief Bioinform. 2025 Mar 4;26(2). doi: 10.1093/bib/bbaf129.
3
Graph attention and Kolmogorov-Arnold network based smart grids intrusion detection.基于图注意力和柯尔莫哥洛夫-阿诺德网络的智能电网入侵检测
Sci Rep. 2025 Mar 13;15(1):8648. doi: 10.1038/s41598-025-88054-9.
4
HyperKAN: Kolmogorov-Arnold Networks Make Hyperspectral Image Classifiers Smarter.HyperKAN:柯尔莫哥洛夫-阿诺德网络让高光谱图像分类器更智能。
Sensors (Basel). 2024 Nov 30;24(23):7683. doi: 10.3390/s24237683.
5
Brain tumor segmentation and detection in MRI using convolutional neural networks and VGG16.使用卷积神经网络和VGG16在磁共振成像(MRI)中进行脑肿瘤分割与检测
Cancer Biomark. 2025 Mar;42(3):18758592241311184. doi: 10.1177/18758592241311184. Epub 2025 Apr 4.
6
Simulating fish autonomous swimming behaviours using deep reinforcement learning based on Kolmogorov-Arnold Networks.基于柯尔莫哥洛夫-阿诺德网络,使用深度强化学习模拟鱼类自主游泳行为。
Bioinspir Biomim. 2025 Jan 16;20(2). doi: 10.1088/1748-3190/ada59c.
7
Kolmogorov-Arnold and Long Short-Term Memory Convolutional Network Models for Supervised Quality Recognition of Photoplethysmogram Signals.用于光电容积脉搏波信号监督质量识别的柯尔莫哥洛夫 - 阿诺德和长短期记忆卷积网络模型
Entropy (Basel). 2025 Mar 21;27(4):326. doi: 10.3390/e27040326.
8
SineKAN: Kolmogorov-Arnold Networks using sinusoidal activation functions.正弦KAN:使用正弦激活函数的柯尔莫哥洛夫 - 阿诺德网络。
Front Artif Intell. 2025 Jan 15;7:1462952. doi: 10.3389/frai.2024.1462952. eCollection 2024.
9
KRN-DTI: Towards accurate drug-target interaction prediction with Kolmogorov-Arnold and residual networks.KRN-DTI:利用柯尔莫哥洛夫-阿诺德和残差网络实现准确的药物-靶点相互作用预测
Methods. 2025 Aug;240:137-144. doi: 10.1016/j.ymeth.2025.04.009. Epub 2025 Apr 24.
10
Research on a Novel Unsupervised-Learning-Based Pipeline Leak Detection Method Based on Temporal Kolmogorov-Arnold Network with Autoencoder Integration.基于具有自动编码器集成的时间柯尔莫哥洛夫-阿诺德网络的新型无监督学习管道泄漏检测方法研究
Sensors (Basel). 2025 Jan 10;25(2):384. doi: 10.3390/s25020384.

本文引用的文献

1
An efficient intrusion detection model based on convolutional spiking neural network.一种基于卷积脉冲神经网络的高效入侵检测模型。
Sci Rep. 2024 Mar 25;14(1):7054. doi: 10.1038/s41598-024-57691-x.
2
Unleashing the Power of IoT: A Comprehensive Review of IoT Applications and Future Prospects in Healthcare, Agriculture, Smart Homes, Smart Cities, and Industry 4.0.释放物联网的力量:物联网在医疗保健、农业、智能家居、智慧城市和工业 4.0 中的应用及未来展望的全面综述。
Sensors (Basel). 2023 Aug 16;23(16):7194. doi: 10.3390/s23167194.
3
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.
CICIoT2023:物联网环境中大规模攻击的实时数据集和基准
Sensors (Basel). 2023 Jun 26;23(13):5941. doi: 10.3390/s23135941.
4
An intelligent identification and classification system for malicious uniform resource locators (URLs).一种针对恶意统一资源定位符(URL)的智能识别与分类系统。
Neural Comput Appl. 2023 Apr 20:1-17. doi: 10.1007/s00521-023-08592-z.
5
A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach.一种使用混合学习方法识别恶意 DNS over HTTPS 流量的轻量级两阶段方案。
Sensors (Basel). 2023 Mar 27;23(7):3489. doi: 10.3390/s23073489.