MFT: A novel memory flow transformer efficient intrusion detection method

被引:1
|
作者
Jiang, Xuefeng [1 ]
Xu, Liuquan [2 ]
Yu, Li [2 ]
Fang, Xianjin [2 ]
机构
[1] Anhui Univ Sci & Technol, Sch Safety Sci & Engn, Huainan 232001, Anhui, Peoples R China
[2] Anhui Univ Sci & Technol, Sch Comp Sci & Engn, Huainan 232001, Anhui, Peoples R China
关键词
Intrusion detection; Transformer; memory flow; CICIDS; 2017; NSL-KDD;
D O I
10.1016/j.cose.2024.104174
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection is a critical field in network security research that is devoted to detecting malicious traffic or attacks on networks. Even with the advances in today's Internet environment, a lot of intrusion detection techniques still fail to take into account the long-term characteristics present in network data, which results in a high false alarm rate. Some researchers have tried to address this problem by using the traditional transformer model; however, it is not very effective when dealing with complex relationships and the subtle classification requirements of large amounts of sequential data. This work presents a novel solution called the memory flow transformer (MFT) in response to the limitations of the conventional transformer model. By utilizing a carefully designed memory flow structure, MFT transcends traditional limitations and makes it possible to obtain complex long-term features from network traffic. This innovation enables the model to identify deep connections at a finer level between a wide variety of network traffic data. Extensive experiments were carried out on the complex CICIDS 2017 and NSL-KDD datasets to validate the effectiveness of the MFT model. The results were outstanding, demonstrating MFT's powerful detection abilities. With regard to performance metrics like accuracy, F1 score, false alarm rate, and training time, MFT is superior to current state-of-the-art approaches. Network security is greatly strengthened by MFT, which provides practitioners in the intrusion detection field with novel and effective techniques.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] HiViT-IDS: An Efficient Network Intrusion Detection Method Based on Vision Transformer
    Zhou, Hai
    Zou, Haojie
    Li, Wei
    Li, Di
    Kuang, Yinchun
    SENSORS, 2025, 25 (06)
  • [2] An Efficient CNN plus Sparse Transformer-Based Intrusion Detection Method for IoT
    Zhang, Yiying
    Fan, Yifan
    Guo, Zhenkun
    Ma, Hao
    Guan, Qianqian
    Jiang, Wei
    Li, Wenjing
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT X, ICIC 2024, 2024, 14871 : 482 - 493
  • [3] A novel intrusion detection method
    Jiang, SY
    Li, QH
    Wang, H
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2004, 3222 : 459 - 462
  • [4] Memory-Efficient Random Forest Generation Method for Network Intrusion Detection
    Choi, Seok-Hwan
    Ko, DongHyun
    Hwang, SeonJin
    Choi, Yoon-Ho
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 305 - 307
  • [5] A Novel Method for Network Intrusion Detection
    Wang, Hongmin
    Wei, Qiang
    Xie, Yaobin
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [6] A Novel Intrusion Detection Method for WSN
    Wang, Sijia
    Li, Qi
    Guo, Yanhui
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 1352 - 1356
  • [7] A novel multi-scale network intrusion detection model with transformer
    Xi, Chiming
    Wang, Hui
    Wang, Xubin
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [8] A Novel Intrusion Detection Method for Internet of Things
    Li, Peisong
    Zhang, Ying
    PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019), 2019, : 4761 - 4765
  • [9] A Novel Method for Intrusion Detection in Relational Databases
    Ramachandran, Raji
    Arya, P.
    Jayanthy, P. G.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 230 - 235
  • [10] A Novel Intrusion Detection Method for Imbalanced Datasets
    Li, Qiang
    Fu, Yanfang
    Cao, Zijian
    Du, Zhiqiang
    Zhang, Qizhe
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2025, 15