Campus Network Intrusion Detection Based on Gated Recurrent Neural Network and Domain Generation Algorithm

被引:0
|
作者
Rong, Qi [1 ]
Zhao, Guang [2 ]
机构
[1] Jilin Inst Architecture & Technol, Party Comm Org Dept, Changchun, Peoples R China
[2] Shandong Univ Finance & Econ, Sch Stat, Jinan, Peoples R China
关键词
Gated recurrent; domain generation algorithm; campus network; threat detection; neural network; DETECTION SYSTEM;
D O I
10.14569/IJACSA.2023.0140853
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network attacks are diversified, rare and Universal generalization. This has made the exploration and construction of network information flow packet threat detection systems, which becomes a hot research topic in preventing network attacks. So this study establishes a network data threat detection model based on traditional network threat detection systems and deep learning neural networks. And convolutional neural network and data enhancement technology are used to optimize the model and improve rare data recognizing accuracy. The experiment confirms that this detection model has a recognition probability of approximately 11% and 42% for two rare attacks when N=1, respectively. When N=2, their probabilities are 52% and 78%, respectively. When N=3, their recognition probabilities are approximately 85% and 92%, respectively. When N=4, their recognition probabilities are about 58% and 68%, respectively, with N=3 having the best recognition effect. In addition, the recognition efficiency of this model for malicious domain name attacks and normal data remains around 90%, which has significant advantages compared to traditional detection systems. The proposed network data flow threat detection model that integrates Gated Recurrent Neural Network and Domain Generation Algorithm has certain practicality and feasibility.
引用
收藏
页码:484 / 492
页数:9
相关论文
共 50 条
  • [41] Deep Complex Gated Recurrent Networks-Based IoT Network Intrusion Detection Systems
    El-Shafeiy, Engy
    Elsayed, Walaa M.
    Elwahsh, Haitham
    Alsabaan, Maazen
    Ibrahem, Mohamed I.
    Elhady, Gamal Farouk
    SENSORS, 2024, 24 (18)
  • [42] A Model of Intrusion Detection Based on Data Mining in Campus Network
    Qi Bei
    Dong Yun-feng
    NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 317 - +
  • [43] Intrusion Detection Based on RBF Neural Network
    Bi, Jing
    Zhang, Kun
    Cheng, Xiaojing
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 357 - 360
  • [44] An Intrusion Detection System Based On Neural Network
    Can, Okan
    Sahingoz, Ozgur Koray
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 2302 - 2305
  • [45] A Gated Recurrent Convolutional Neural Network for Robust Spoofing Detection
    Gomez-Alanis, Alejandro
    Peinado, Antonio M.
    Gonzalez, Jose A.
    Gomez, Angel M.
    IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2019, 27 (12) : 1985 - 1999
  • [46] Network intrusion detection based on GMKL Algorithm
    Li, Yuxiang
    Wang, Haiming
    Yu, Hongkui
    Ren, Changquan
    Geng, Qingjia
    Journal of Networks, 2013, 8 (06) : 1315 - 1321
  • [47] LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network
    Yan, Binghao
    Han, Guodong
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [48] A Clustering based Algorithm for Network Intrusion Detection
    Arya, K. V.
    Kumar, Hemant
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 193 - 196
  • [49] Improving the Particle Swarm Algorithm and Optimizing the Network Intrusion Detection of Neural Network
    Yang, Xu
    Hui, Zhao
    PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015, 2015, : 452 - 455
  • [50] Network Intrusion Detection Analysis with Neural Network and Particle Swarm Optimization Algorithm
    Tian, WenJie
    Liu, JiCheng
    2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 1749 - 1752