MFT: A novel memory flow transformer efficient intrusion detection method

被引:1
|
作者
Jiang, Xuefeng [1 ]
Xu, Liuquan [2 ]
Yu, Li [2 ]
Fang, Xianjin [2 ]
机构
[1] Anhui Univ Sci & Technol, Sch Safety Sci & Engn, Huainan 232001, Anhui, Peoples R China
[2] Anhui Univ Sci & Technol, Sch Comp Sci & Engn, Huainan 232001, Anhui, Peoples R China
关键词
Intrusion detection; Transformer; memory flow; CICIDS; 2017; NSL-KDD;
D O I
10.1016/j.cose.2024.104174
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection is a critical field in network security research that is devoted to detecting malicious traffic or attacks on networks. Even with the advances in today's Internet environment, a lot of intrusion detection techniques still fail to take into account the long-term characteristics present in network data, which results in a high false alarm rate. Some researchers have tried to address this problem by using the traditional transformer model; however, it is not very effective when dealing with complex relationships and the subtle classification requirements of large amounts of sequential data. This work presents a novel solution called the memory flow transformer (MFT) in response to the limitations of the conventional transformer model. By utilizing a carefully designed memory flow structure, MFT transcends traditional limitations and makes it possible to obtain complex long-term features from network traffic. This innovation enables the model to identify deep connections at a finer level between a wide variety of network traffic data. Extensive experiments were carried out on the complex CICIDS 2017 and NSL-KDD datasets to validate the effectiveness of the MFT model. The results were outstanding, demonstrating MFT's powerful detection abilities. With regard to performance metrics like accuracy, F1 score, false alarm rate, and training time, MFT is superior to current state-of-the-art approaches. Network security is greatly strengthened by MFT, which provides practitioners in the intrusion detection field with novel and effective techniques.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Efficient algorithms for intrusion detection
    Boora, NK
    Bhattacharyya, C
    Gopinath, K
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2004, 3347 : 346 - 352
  • [32] Novel Intrusion Detection Method based on Triangular Matrix Factorization
    Qi Yingchun
    Niu Ling
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 249 - 258
  • [33] A novel method of intrusion detection based on artificial immune system
    Zhang, Yu-Fang
    Sun, Gui-Hua
    Xiong, Zhong-Yang
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1602 - +
  • [34] A novel intrusion detection method for mobile ad hoc networks
    Yi, P
    Zhong, YP
    Zhang, SY
    ADVANCES IN GRID COMPUTING - EGC 2005, 2005, 3470 : 1183 - 1192
  • [35] The Novel Preprocessing Method Based on Feature Extraction for Intrusion Detection
    Khazaee, Saeed
    Abade, Mohammad Saniee
    2011 SECOND INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND EDUCATION APPLICATION (ICEA 2011), 2011, : 60 - +
  • [36] FCNN: An Efficient Intrusion Detection Method Based on Raw Network Traffic
    Wang, Yue
    Jiang, Yiming
    Lan, Julong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [37] A Lightweight and Efficient IoT Intrusion Detection Method Based on Feature Grouping
    He, Mingshu
    Huang, Yuanming
    Wang, Xinlei
    Wei, Peng
    Wang, Xiaojuan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) : 2935 - 2949
  • [38] A Collaborative, Secure and Energy Efficient Intrusion Detection Method for Homogeneous WSN
    Mubarak, T. Mohamed
    Sattar, Syed Abdul
    Rao, Appa
    Sajitha, M.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 102 - +
  • [39] A method of generating highly efficient string matching circuit for intrusion detection
    Katashita, Toshihiro
    Maeda, Atsusi
    Toda, Kenji
    Yamaguchi, Yoshinori
    2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2006, : 799 - 802
  • [40] Using Approximation of Standard Deviation and Variance in Flow Features for Efficient Intrusion Detection
    Puselj, Dora
    Katic, Lovro
    Ostroski, Dominik
    Brajdic, Ivona
    Slovenec, Karlo
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (CONTEL 2021), 2021, : 129 - 133