Abstract
AbstractIn-vehicle network intrusion detection tasks, it is usually necessary to simultaneously meet the requirements of low computational power consumption, real-time response, and high detection accuracy. In response to the class imbalance problem in existing vehicle network anomaly flow detection methods, which leads to longer training convergence time and low detection accuracy, an anomaly flow detection method using GCN-BiLSTM-Attention is proposed. Firstly, Graph Convolutional Networks (GCN) is used to obtain spatial correlations between data streams. Secondly, obtaining the time correlation to predict the next time slice flow matrix by capitalizing the variant Bidirectional Long Short-Term Memory (BiLSTM) network. Last but not least, an attention mechanism is designed for extracting key information from the data stream. The results of experiment prove that the binary classification false positive rate, detection rate, and F1 value of the proposed GCN-BiLSTM-Attention-based anomaly flow detection method on the NSL-KDD dataset are 95.87%, 6.31%, and 94.25%, respectively; The false positive rate, detection rate, and F1 value on the CICID2017 dataset are 6.01%, 94.12%,and 94.36%, respectively. The proposed GCN-BiLSTM-Attention model has exceeded the compared methods in detecting abnormal traffic in the context of the Internet of Vehicles, and it can better preserve local features of traffic data.
Funder
The Software Engineering Provincial Basic Teaching and Research Office Demonstration Project
Ministry of Education Industry-University-Research Project
School-level Scientific Research Platform Project
School-level Offline Course Project
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference39 articles.
1. L. Fu, W. Zhang, X. Tan et al., An algorithm for detection of traffic attribute exceptions based on cluster algorithm in industrial internet of things. IEEE Access 9(2), 53370–53378 (2021)
2. N. Moustafa, B. Turnbull, K.K.R. Choo, An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J. (2018)
3. L. Cui, S. Yang, F. Chen et al., A survey on application of machine learning for Internet of Things. Int. J. Mach. Learn. Cybern. 9(1), 1399–1417 (2018)
4. G. Shi, X. Shen, F. Xiao et al., DANTD: a deep abnormal network traffic detection model for security of industrial internet of things using high-order features. IEEE Internet Things J. 2(11), 121–134 (2023)
5. Y. Otoum, A. Nayak, As-ids: anomaly and signature based ids for the internet of things. J. Netw. Syst. Manag. 2(3), 1–26 (2021)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献