skip to main content
10.1145/3653781.3653807acmotherconferencesArticle/Chapter ViewAbstractPublication PagescvdlConference Proceedingsconference-collections
research-article

A CNN-BiLSTM Method Based on Attention Mechanism for Class-imbalanced Abnormal Traffic Detection

Published: 01 June 2024 Publication History

Abstract

Abstract: Network traffic anomaly detection technology is an effective method for monitoring network security status and identifying potential attacks. With the increasing volume of network traffic data exhibiting high dimensionality and imbalance, traditional intrusion detection models face limitations in detection efficiency and accuracy. Existing intrusion detection methods often overlook issues related to temporal features in data and class imbalances, further hindering intrusion detection efficiency. In response to these challenges, this paper proposes an attention-based convolutional neural networks–long short-term memory (CNN-BiLSTM) network structure to enhance intrusion detection efficiency. By integrating CNN and BiLSTM networks to jointly learn spatio-temporal features of the data, and introducing an attention mechanism to deeply capture hidden feature relationships, this approach accelerates model convergence while balancing accuracy and efficiency. Additionally, to address class imbalance issues in network anomaly traffic, this study optimizes the cross-entropy loss function by introducing a cyclical focal loss function (CFL). This function cyclically adjusts the model's focus on different samples, thereby enhancing the detection rate of challenging samples and improving the model's generalization capabilities. Experiments conducted on the UNSW-NB15 datasets demonstrate that the proposed algorithm achieves a high accuracy of 97.09% while ensuring efficiency. Moreover, it effectively enhances the detection rate of imbalanced samples, highlighting its capability in handling class imbalances within anomaly traffic.
Keywords: abnormal traffic detection detection; attention mechanism; CNN-BiLSTM; imbalanced data

References

[1]
LIAO H J, LIN C H, LIN Y C, Intrusion detection system: a comprehensive review [ J]. Journal of Network and Computer Applications, 2013, 36 (1): 16 - 24.
[2]
Zhou Mingyue, Chang Minghang, Fu Dianchen, etc.A network intrusion detection algorithm based on EA-BinGRU algorithm [J].Computer Applications and Software, 2019,40(11):321-326.
[3]
Le, T.-T.-H.; Oktian, Y.E.; Kim, H. XGBoost for Imbalanced Multiclass Classification-Based Industrial Internet of Things Intrusion Detection Systems. Sustainability 2022, 14, 8707. https://doi.org/10.3390/su14148707
[4]
Su Xin, Zhang Guifu, Hang Hongyan Intrusion detection of Marine meteorological sensor network based on balanced generative adversarial network [J]. Journal of Communications, 2023, 44(04): 124-136.
[5]
Abdelmoumin, G.; Whitaker, J.; Rawat, D.B.; Rahman, A. A Survey on Data-Driven Learning for Intelligent Network Intrusion Detection Systems. Electronics 2022, 11, 213. https://doi.org/10.3390/electronics11020213
[6]
Smith, L. N. (2022). Cyclical focal loss. arXiv preprint arXiv:2202.08978.
[7]
X. Zheng and X. Li, "Wind Electricity Power Prediction Based on CNN - LSTM Network Model," 2023 IEEE International Conference on Sensors, Electronics and Computer Engineering (ICSECE), Jinzhou, China, 2023, pp. 231-236.
[8]
Vaswani A, Shazeer N, Parmar N,et al.Attention Is All You Need[J].arXiv, 2017.
[9]
N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia, 2015, pp. 1-6.
[10]
Li Jun, Xia Songzhu, LAN Haiyan, Network Intrusion Detection method based on GRU-RNN [J].Journal of Harbin Engineering University, 2021, 42 (6).
[11]
X. Wang, X. Wang, M. He, M. Zhang and Z. Lu, "Spatial-Temporal Graph Model Based on Attention Mechanism for Anomalous IoT Intrusion Detection," in IEEE Transactions on Industrial Informatics.
[12]
Altunay, Hakan Can and Zafer Albayrak. “A hybrid CNN + LSTMbased intrusion detection system for industrial IoT networks.” Engineering Science and Technology, an International Journal (2023): n. pag.

Cited By

View all
  • (2024)Performance Evaluation of Intrusion Detection Systems on the TON_IoT Datasets Using a Feature Selection MethodProceedings of the 2024 8th International Conference on Computer Science and Artificial Intelligence10.1145/3709026.3709048(607-613)Online publication date: 6-Dec-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CVDL '24: Proceedings of the International Conference on Computer Vision and Deep Learning
January 2024
506 pages
ISBN:9798400718199
DOI:10.1145/3653804
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2024

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CVDL 2024

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)54
  • Downloads (Last 6 weeks)13
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Performance Evaluation of Intrusion Detection Systems on the TON_IoT Datasets Using a Feature Selection MethodProceedings of the 2024 8th International Conference on Computer Science and Artificial Intelligence10.1145/3709026.3709048(607-613)Online publication date: 6-Dec-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media