Redirigiendo al acceso original de articulo en 22 segundos...
Inicio  /  Applied Sciences  /  Vol: 13 Par: 22 (2023)  /  Artículo
ARTÍCULO
TITULO

An Effective Method for Detecting Unknown Types of Attacks Based on Log-Cosh Variational Autoencoder

Li Yu    
Liuquan Xu and Xuefeng Jiang    

Resumen

The increasing prevalence of unknown-type attacks on the Internet highlights the importance of developing efficient intrusion detection systems. While machine learning-based techniques can detect unknown types of attacks, the need for innovative approaches becomes evident, as traditional methods may not be sufficient. In this research, we propose a deep learning-based solution called the log-cosh variational autoencoder (LVAE) to address this challenge. The LVAE inherits the strong modeling abilities of the variational autoencoder (VAE), enabling it to understand complex data distributions and generate reconstructed data. To better simulate discrete features of real attacks and generate unknown types of attacks, we introduce an effective reconstruction loss term utilizing the logarithmic hyperbolic cosine (log-cosh) function in the LVAE. Compared to conventional VAEs, the LVAE shows promising potential in generating data that closely resemble unknown attacks, which is a critical capability for improving the detection rate of unknown attacks. In order to classify the generated unknown data, we employed eight feature extraction and classification techniques. Numerous experiments were conducted using the latest CICIDS2017 dataset, training with varying amounts of real and unknown-type attacks. Our optimal experimental results surpassed several state-of-the-art techniques, achieving accuracy and average F1 scores of 99.89% and 99.83%, respectively. The suggested LVAE strategy also demonstrated outstanding performance in generating unknown attack data. Overall, our work establishes a solid foundation for accurately and efficiently identifying unknown types of attacks, contributing to the advancement of intrusion detection techniques.

 Artículos similares

       
 
Okponmwense Moses,Queen Omone Asekhame     Pág. 165 - 174
Soil contamination with heavy metals is a global environmental matter of interest due to its thinkable dangers to humans, environmental health and ecosystem preceding shortfalls in agricultural produce and dangerous health outcomes as they penetrate the ... ver más

 
Majdi Sukkar, Madhu Shukla, Dinesh Kumar, Vassilis C. Gerogiannis, Andreas Kanavos and Biswaranjan Acharya    
Effective collision risk reduction in autonomous vehicles relies on robust and straightforward pedestrian tracking. Challenges posed by occlusion and switching scenarios significantly impede the reliability of pedestrian tracking. In the current study, w... ver más
Revista: Information

 
Longxin Yao, Yun Lu, Mingjiang Wang, Yukun Qian and Heng Li    
The construction of complex networks from electroencephalography (EEG) proves to be an effective method for representing emotion patterns in affection computing as it offers rich spatiotemporal EEG features associated with brain emotions. In this paper, ... ver más
Revista: Applied Sciences

 
Xiaojun Zhang, Zhuo Li, Zheng Wei and Wenxue Gao    
Blasting technology is widely applied in various engineering applications due to its cost-effectiveness and high efficiency, such as in mining, transport infrastructure construction, and building demolition. However, the occurrence of cracking in the rea... ver más
Revista: Applied Sciences

 
Yu Sun and Zhiqiang Zhang    
Accurately classifying degraded images is a challenging task that relies on domain expertise to devise effective image processing techniques for various levels of degradation. Genetic Programming (GP) has been proven to be an excellent approach for solvi... ver más
Revista: Applied Sciences