DTT: A Dual-domain Transformer model for Network Intrusion Detection

Chenjian Xu, Weirui Sun, Mengxue Li
{"title":"DTT: A Dual-domain Transformer model for Network Intrusion Detection","authors":"Chenjian Xu, Weirui Sun, Mengxue Li","doi":"10.4108/eetsis.5445","DOIUrl":null,"url":null,"abstract":"With the rapid evolution of network technologies, network attacks have become increasingly intricate and threatening. The escalating frequency of network intrusions has exerted a profound influence on both industrial settings and everyday activities. This underscores the urgent necessity for robust methods to detect malicious network traffic. While intrusion detection techniques employing Temporal Convolutional Networks (TCN) and Transformer architectures have exhibited commendable classification efficacy, most are confined to the temporal domain. These methods frequently fall short of encompassing the entirety of the frequency spectrum inherent in network data, thereby resulting in information loss. To mitigate this constraint, we present DTT, a novel dual-domain intrusion detection model that amalgamates TCN and Transformer architectures. DTT adeptly captures both high-frequency and low-frequency information, thereby facilitating the simultaneous extraction of local and global features. Specifically, we introduce a dual-domain feature extraction (DFE) block within the model. This block effectively extracts global frequency information and local temporal features through distinct branches, ensuring a comprehensive representation of the data. Moreover, we introduce an input encoding mechanism to transform the input into a format suitable for model training. Experiments conducted on two distinct datasets address concerns regarding data duplication and diverse attack types, respectively. Comparative experiments with recent intrusion detection models unequivocally demonstrate the superior performance of the proposed DTT model.","PeriodicalId":502678,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"2 2","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICST Transactions on Scalable Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/eetsis.5445","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With the rapid evolution of network technologies, network attacks have become increasingly intricate and threatening. The escalating frequency of network intrusions has exerted a profound influence on both industrial settings and everyday activities. This underscores the urgent necessity for robust methods to detect malicious network traffic. While intrusion detection techniques employing Temporal Convolutional Networks (TCN) and Transformer architectures have exhibited commendable classification efficacy, most are confined to the temporal domain. These methods frequently fall short of encompassing the entirety of the frequency spectrum inherent in network data, thereby resulting in information loss. To mitigate this constraint, we present DTT, a novel dual-domain intrusion detection model that amalgamates TCN and Transformer architectures. DTT adeptly captures both high-frequency and low-frequency information, thereby facilitating the simultaneous extraction of local and global features. Specifically, we introduce a dual-domain feature extraction (DFE) block within the model. This block effectively extracts global frequency information and local temporal features through distinct branches, ensuring a comprehensive representation of the data. Moreover, we introduce an input encoding mechanism to transform the input into a format suitable for model training. Experiments conducted on two distinct datasets address concerns regarding data duplication and diverse attack types, respectively. Comparative experiments with recent intrusion detection models unequivocally demonstrate the superior performance of the proposed DTT model.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
DTT:用于网络入侵检测的双域变压器模型
随着网络技术的飞速发展,网络攻击变得越来越复杂和具有威胁性。日益频繁的网络入侵对工业环境和日常活动都产生了深远的影响。这突出表明,迫切需要强有力的方法来检测恶意网络流量。虽然采用时态卷积网络(TCN)和变换器架构的入侵检测技术已经显示出值得称道的分类功效,但大多数都局限于时态域。这些方法往往无法涵盖网络数据固有的全部频谱,从而导致信息丢失。为了缓解这一限制,我们提出了 DTT,一种融合了 TCN 和 Transformer 架构的新型双域入侵检测模型。DTT 能够巧妙地捕捉高频和低频信息,从而有助于同时提取局部和全局特征。具体来说,我们在模型中引入了双域特征提取(DFE)模块。该模块通过不同的分支有效提取全局频率信息和局部时间特征,确保数据的全面呈现。此外,我们还引入了输入编码机制,将输入转换为适合模型训练的格式。在两个不同的数据集上进行的实验分别解决了数据重复和攻击类型多样化的问题。与最新入侵检测模型的对比实验明确证明了所提出的 DTT 模型的优越性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Machine learning as a teaching strategy education: A review DTT: A Dual-domain Transformer model for Network Intrusion Detection Research and Design of Encryption Standards Based on IoT Network Layer Information Security of Data Enhanced Design of a Tai Chi Teaching Assistance System Integrating DTW Algorithm and SVM Analysis of Employment Competitiveness of College Students Based on Binary Association Rule Extraction Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1