Affiliation:
1. Communication and Network Laboratory, Dalian University, Dalian 116622, China
Abstract
Aiming at the problems of low accuracy of network attack prediction and long response time of attack detection, bidirectional long short-term memory (BiLSTM) was used to predict network attacks. However, BiLSTM has the problems of difficulty in parameter setting and low accuracy of the prediction model. This paper first proposes the Improved Grey Wolf algorithm (IGWO) to optimize the BiLSTM (IGWO-BiLSTM). First, IGWO uses Dimension Learning Hunting (DLH) strategy to construct the wolf neighborhood. In the established wolf neighborhood, the BiLSTM parameters are iteratively optimized to obtain a prediction model with fast convergence speed and small reconstruction error. Secondly, the dataset is preprocessed, and the IP packet statistical signature (IPDCF) is defined according to the characteristics of denial of service (DOS) and distributed denial of service (DDOS) attacks. IPDCF was used to establish the time series model and network traffic time series data were input into IGWO-BiLSTM to get the prediction results. Finally, the DOS and DDOS network packets were input into the trained prediction model to obtain the prediction results of attack data. By comparing the predicted values of IGWO-BiLSTM normal network packets and attack packets, a reasonable threshold is set to provide the basis for the subsequent attack prediction. Experiments show that the IGWO-BiLSTM can reach 99.05% of the fitting degree and accurately distinguish network attacks from normal network demand increases.
Funder
Equipment Development Department of the Central Military Commission
Dalian University
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference23 articles.
1. Deep learning approaches for anomaly and intrusion detection in computer network: A review;Roshan;Cyber Security and Digital Forensics: Proceedings of ICCSDF,2021
2. Overview of network intrusion detection technology;Jian;J. Cyber Secur.,2020
3. Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review;Cheema;Secur. Commun. Netw.,2022
4. Black, S., and Kim, Y. (2022, January 26–29). An Overview on Detection and Prevention of Application Layer DDoS Attacks. Proceedings of the IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.
5. Dynamic defenses in cyber security: Techniques, methods and challenges;Zheng;Digit. Commun. Netw.,2022
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献