RESNETCNN: An abnormal network traffic flows detection model
نویسندگان
چکیده
Intrusion detection is an important means to protect system security by detecting intrusions or intrusion attempts on the through operational behaviors, logs, and data audit. However, existing systems suffer from incomplete feature extraction low classification accuracy, which affects effect. To this end, paper proposes model that fuses residual network (RESNET) parallel crossconvolutional neural network, called RESNETCCN. RESNETCNN can efficiently learn various stream features fusion of deep learning convolutional (CNN), improves accuracy abnormal streams in unbalanced streams, moreover, oversampling method into preprocessing, extract multiple types at same time, effectively solving problems streams. Finally, three improved versions networks are designed meet requirements different traffic processing, highest reaches 99.98% CICIDS 2017 dataset 99.90% ISCXIDS 2012 dataset.
منابع مشابه
Towards Flow - based Abnormal Network Traffic Detection
One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network performance. This paper presents an abnorm...
متن کاملSequential Non-Bayesian Network Traffic Flows Anomaly Detection and Isolation
Sequential detection (and isolation) of unusual and significant changes in network Origin-Destination (OD) traffic volumes from simple link load measurements is considered in the paper. The ambient traffic, i.e. the OD traffic matrix corresponding to the non-anomalous network state, is unknown and it is considered here as a nuisance parameter because it can mask the anomalies. Since the OD traf...
متن کاملMaxwell model of traffic flows
We investigate traffic flows using the kinetic Boltzmann equations with a Maxwell collision integral. This approach allows analytical determination of the transient behavior and the size distributions. The relaxation of the car and cluster velocity distributions towards steady state is characterized by a wide range of velocitydependent relaxation scales, R,t(v),R , with R the ratio of the passi...
متن کاملPredicting Information Flows in Network Traffic
In optimizing information flows in networks, it would be useful to predict aspects of the network traffic. Yet, the notion of predicting network traffic does not appear in the relevant literature reporting analysis of network traffic. This literature is both well developed and skeptical about the value of traditional time series analysis on network data. It has consistently reported three “traf...
متن کاملNetwork Traffic Anomaly Detection
This paper presents a tutorial for network anomaly detection, focusing on non-signature-based approaches. Network traffic anomalies are unusual and significant changes in the traffic of a network. Networks play an important role in today’s social and economic infrastructures. The security of the network becomes crucial, and network traffic anomaly detection constitutes an important part of netw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science and Information Systems
سال: 2023
ISSN: ['1820-0214', '2406-1018']
DOI: https://doi.org/10.2298/csis221124004l