Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism

Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism

Ping Zhao, Zhijie Fan*, Zhiwei Cao, Xin Li
Copyright: © 2022 |Pages: 20
DOI: 10.4018/IJISP.290832
Article PDF Download
Open access articles are freely available for download

Abstract

In order to improve the ability to detect network attacks, traditional intrusion detection models often used convolutional neural networks to encode spatial information or recurrent neural networks to obtain temporal features of the data. Some models combined the two methods to extract spatio-temporal features. However, these approaches used separate models and learned features insufficiently. This paper presented an improved model based on temporal convolutional networks (TCN) and attention mechanism. The causal and dilation convolution can capture the spatio-temporal dependencies of the data. The residual blocks allow the network to transfer information in a cross-layered manner, enabling in-depth network learning. Meanwhile, attention mechanism can enhance the model's attention to the relevant anomalous features of different attacks. Finally, this paper compared models results on the KDD CUP99 and UNSW-NB15 datasets. Besides, the authors apply the model to video surveillance network attack detection scenarios. The result shows that the model has advantages in evaluation metrics.
Article Preview
Top

Introduction

With the advent of big data, the Internet constitutes an indispensable tool and platform for human society to progress, work and share information. While the network brings significant benefits to humanity, network information security also worries most network users and is widely concerning in all walks of life (Liu et al, 2018, Yin et al, 2017 and Zhang et al, 2021). Especially in the financial, medical, military, and public security fields. In these fields, abnormal network attacks and data privacy leaks have emerged, resulting in irreparable losses to the state, enterprises, and individuals (Zhang et al, 2021). So the issue of securing and maintaining a secure network environment needs to be addressed urgently.

As active defense tools, network intrusion detection models can monitor network traffic in real-time, sense hidden attacks and analyze various types of attack behaviors (Tian et al, 2021). As a result, these tools help maintain network information security and propose corresponding protection strategies. Compared with passive defense measures against network attacks, intrusion detection models can detect known attacks while discovering unknown attacks and have produced many efficient model results. With the feasibility in improving the real-time monitoring efficiency, reducing false alarm rates, and shortening detection times, intrusion detection is still an indispensable focus of research for network security defense today.

Network intrusion detection systems include techniques based on traditional machine learning, based on deep learning, reinforcement learning, and visualization learning (Wang et al, 2021). The most widely used techniques in intrusion detection include the K-Nearest Neighbor algorithm(KNN) that can reflect the difference between normal and abnormal traffic, achieving classification for various attack types without parameter estimation. Hurley et al (2016) uses principal component analysis to re-extract features and then uses KNN-based models for attack identification and classification. But large and higher-order data can make the algorithm less accurate. Compared with other machine learning algorithms, the Support Vector Machine(SVM) can improve the detection accuracy based on solving the imbalance of data samples. Teng et al (2014) and Reddy et al (2016) used SVM-based methods to effectively detect DDOS attacks, probe attacks, and other abnormal behaviors. In recent years, with the breakthroughs in deep learning research in natural language processing, image recognition, and other fields have been achieved. In contrast, the traditional machine learning methods require professionals with extensive domain knowledge to carry out manual feature extraction, as a shallow learning method has been unable to effectively cope with the massive data resources, and the network bandwidth increase caused by complex and variable data features.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing