Research on Network Intrusion Detection Based on Transformer

Authors

  • Gang Gan
  • Weiju Kong

DOI:

https://doi.org/10.54097/fcis.v3i3.7987

Keywords:

Intrusion Detection, Deep Learning, Transformer, Bidirectional Long Short-Term Memory

Abstract

With the advancement of technology, the development of various industries has become inseparable from informatization. People's lives have become closely related to the network. While using the network to facilitate our lives, massive data is also generated. Traditional firewall technologies are no longer sufficient to meet current needs. Deep learning algorithms can establish complex mapping relationships between network data, and can extract hidden correlation features between data features to achieve data recognition and prediction. Therefore, this paper introduces Transformer and Bidirectional Long Short-Term Memory (BiLSTM) into the field of intrusion detection, and proposes an intrusion detection method based on the combination of Transformer-Encoder and BiLSTM (TBL). Deep Neural Networks (DNN) are used to further extract data features, and the softmax function is used to output classification results. In order to verify the effectiveness of this method, this paper trains and tests the TBL method on the NSL-KDD dataset, and verifies its feasibility and superiority.

Downloads

Download data is not yet available.

References

Yang L, Shami A. A transfer learning and optimized CNN based intrusion detection system for internet of vehicles[J]. arXiv preprint arXiv:2201.11812, 2022.

Xiao Y, Xiao X. An intrusion detection system based on a simplified residual network[J]. Information,2019, 10(11): 356.

YU Y, LIU G, YAN H, et al. Attention-based BiLSTM model for anomalous HTTP traffic detection[C]//2018 15th International Conference on Service Systems and Service Management, 2018: 1-6.

BEDI P, GUPTA N, JINDAL V. Siam-IDS: handling class imbalance problem in intrusion detection systems using siamese neural network[J].Procedia Computer Science, 2020, 171: 780-789.

Li Chuan. Research and Implementation of Intrusion Detection Based on Generative Adversarial Networks [D]. North China Electric Power University (Beijing),2022.DOI:10.27140 /d.cnki.ghbbu. 2022.000269.

FU Y, DU Y, CAO Z, et al. A deep learning model for network intrusion detection with imbalanced data[J]. Electronics, 2022, 11(6): 898.

Staudemeyer R C .Applying long short-term memory recurrent neural networks to intrusion detection[J]. South African Computer Journal, 2015,(1):136-154.

Volodymyr Mnih,Nicolas Heess,Alex Graves,Koray Kavukcuoglu. Recurrent Models of Visual Attention. arXiv. preprint arXiv:1406.6247v1.2014.

Mhaskar H N, Micchelli C A. How to choose an activation function[J].Advances in Neural Information Processing Systems,1994: 319-326.

He K, Zhang X, Ren S , et al. Identity Mappings in Deep Residual Networks[C]// European Conference on Computer Vision. Springer, Cham, 2016.

Luong M T, Pham H, Manning C D. Effective approaches to attention-based neural machine translation[J]. arXiv preprint arXiv:1508.04025, 2015.

Mnih V, Heess N, Graves A. Recurrent models of visual attention[J]. Advances in neural information processing systems, 2014, 27.

Olanow C W , Koller W C . An algorithm (decision tree) for the management of Parkinson's disease: Treatment guidelines[J]. Neurology, 1998, 50(3 Suppl 3):S1.

Alrawashdeh K , Purdy C . Toward an Online Anomaly Intrusion Detection Systen Based on Deep Learning[C].//2016 15th IEEE International Conference on Machine Learning and Applications(ICMLA).IEEE,2016.

Downloads

Published

04-05-2023

Issue

Section

Articles

How to Cite

Gan, G., & Kong, W. (2023). Research on Network Intrusion Detection Based on Transformer. Frontiers in Computing and Intelligent Systems, 3(3), 22-26. https://doi.org/10.54097/fcis.v3i3.7987