Redirigiendo al acceso original de articulo en 16 segundos...
Inicio  /  Applied Sciences  /  Vol: 13 Par: 22 (2023)  /  Artículo
ARTÍCULO
TITULO

An Effective Method for Detecting Unknown Types of Attacks Based on Log-Cosh Variational Autoencoder

Li Yu    
Liuquan Xu and Xuefeng Jiang    

Resumen

The increasing prevalence of unknown-type attacks on the Internet highlights the importance of developing efficient intrusion detection systems. While machine learning-based techniques can detect unknown types of attacks, the need for innovative approaches becomes evident, as traditional methods may not be sufficient. In this research, we propose a deep learning-based solution called the log-cosh variational autoencoder (LVAE) to address this challenge. The LVAE inherits the strong modeling abilities of the variational autoencoder (VAE), enabling it to understand complex data distributions and generate reconstructed data. To better simulate discrete features of real attacks and generate unknown types of attacks, we introduce an effective reconstruction loss term utilizing the logarithmic hyperbolic cosine (log-cosh) function in the LVAE. Compared to conventional VAEs, the LVAE shows promising potential in generating data that closely resemble unknown attacks, which is a critical capability for improving the detection rate of unknown attacks. In order to classify the generated unknown data, we employed eight feature extraction and classification techniques. Numerous experiments were conducted using the latest CICIDS2017 dataset, training with varying amounts of real and unknown-type attacks. Our optimal experimental results surpassed several state-of-the-art techniques, achieving accuracy and average F1 scores of 99.89% and 99.83%, respectively. The suggested LVAE strategy also demonstrated outstanding performance in generating unknown attack data. Overall, our work establishes a solid foundation for accurately and efficiently identifying unknown types of attacks, contributing to the advancement of intrusion detection techniques.

 Artículos similares

       
 
Majdi Sukkar, Madhu Shukla, Dinesh Kumar, Vassilis C. Gerogiannis, Andreas Kanavos and Biswaranjan Acharya    
Effective collision risk reduction in autonomous vehicles relies on robust and straightforward pedestrian tracking. Challenges posed by occlusion and switching scenarios significantly impede the reliability of pedestrian tracking. In the current study, w... ver más
Revista: Information

 
Longxin Yao, Yun Lu, Mingjiang Wang, Yukun Qian and Heng Li    
The construction of complex networks from electroencephalography (EEG) proves to be an effective method for representing emotion patterns in affection computing as it offers rich spatiotemporal EEG features associated with brain emotions. In this paper, ... ver más
Revista: Applied Sciences

 
Xiaojun Zhang, Zhuo Li, Zheng Wei and Wenxue Gao    
Blasting technology is widely applied in various engineering applications due to its cost-effectiveness and high efficiency, such as in mining, transport infrastructure construction, and building demolition. However, the occurrence of cracking in the rea... ver más
Revista: Applied Sciences

 
Yu Sun and Zhiqiang Zhang    
Accurately classifying degraded images is a challenging task that relies on domain expertise to devise effective image processing techniques for various levels of degradation. Genetic Programming (GP) has been proven to be an excellent approach for solvi... ver más
Revista: Applied Sciences

 
Justyna Dydek, Katarzyna Blizniak, Hugo Sarmento, Andreas Ihle, Élvio Rúbio Gouveia, Janusz Iskra and Krzysztof Przednowek    
Tensiomyography (TMG) has been described as an effective method for identifying differences in muscle response to athletic training stimuli. However, there is a lack of studies that evaluated changes in muscle contractile properties in response to anaero... ver más
Revista: Applied Sciences