Search: onr:"swepub:oai:DiVA.org:kth-294023" >
Deep-Feature-Based ...
-
He, MingshuBeijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China.
(author)
Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection
- Article/chapterEnglish2021
Publisher, publication year, extent ...
-
Hindawi Limited,2021
-
printrdacarrier
Numbers
-
LIBRIS-ID:oai:DiVA.org:kth-294023
-
https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294023URI
-
https://doi.org/10.1155/2021/6659022DOI
Supplementary language notes
-
Language:English
-
Summary in:English
Part of subdatabase
Classification
-
Subject category:ref swepub-contenttype
-
Subject category:art swepub-publicationtype
Notes
-
QC 20210510
-
With the increase of Internet visits and connections, it is becoming essential and arduous to protect the networks and different devices of the Internet of Things (IoT) from malicious attacks. The intrusion detection systems (IDSs) based on supervised machine learning (ML) methods require a large number of labeled samples. However, the number of abnormal behaviors is far less than that of normal behaviors, let alone that the shots of malicious behavior samples which can be intercepted as training dataset are actually limited. Consequently, it is a key research topic to conduct the anomaly detection for the small number of abnormal behavior samples. This paper proposes an anomaly detection model with a few abnormal samples to solve the problem in few-shot detection based on convolutional neural networks (CNN) and autoencoder (AE). This model mainly consists of the CNN-based supervised pretraining module and the AE-based data reconstruction module. Only a few abnormal samples are utilized to the pretrain module to build the structure of extracting deep features. The data reconstruction module simply chooses the deep features of normal samples as training data. There also exist some effective attention mechanisms in the pretraining module. Through the pretraining of small samples, the accuracy of abnormal detection is improved compared with merely training normal samples with AE. The simulation results prove that this solution can solve the above problems occurring in network behavior anomaly detection. In comparison to the original AE model and other clustering methods, the proposed model advances the detection results in a visible way.
Subject headings and genre
Added entries (persons, corporate bodies, meetings, titles ...)
-
Wang, XiaojuanBeijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China.
(author)
-
Zhou, JunhuaBeijing Inst Elect Syst Engn, State Key Lab Intelligent Mfg Syst Technol, Beijing 100854, Peoples R China.
(author)
-
Xi, YuanyuanKTH,Skolan för elektroteknik och datavetenskap (EECS)(Swepub:kth)u1sl884b
(author)
-
Jin, LeiBeijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China.
(author)
-
Wang, XinleiBeijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China.
(author)
-
Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China.Beijing Inst Elect Syst Engn, State Key Lab Intelligent Mfg Syst Technol, Beijing 100854, Peoples R China.
(creator_code:org_t)
Related titles
-
In:Security and Communication Networks: Hindawi Limited20211939-01141939-0122
Internet link
Find in a library
To the university's database