IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Network Intrusion Detection Method for Various Information Systems Based on Federated and Deep Learning

A Network Intrusion Detection Method for Various Information Systems Based on Federated and Deep Learning
View Sample PDF
Author(s): Qi Zhou (School of Artificial Intelligence, Guangdong Open University, Guangzhou, China)and Chun Shi (School of Electronic and Information, Guangdong Polytechnic Normal University, Guangzhou, China)
Copyright: 2024
Volume: 20
Issue: 1
Pages: 28
Source title: International Journal on Semantic Web and Information Systems (IJSWIS)
Editor(s)-in-Chief: Brij Gupta (Asia University, Taichung City, Taiwan)
DOI: 10.4018/IJSWIS.335495

Purchase

View A Network Intrusion Detection Method for Various Information Systems Based on Federated and Deep Learning on the publisher's website for pricing and purchasing information.

Abstract

Under the premise of ensuring data privacy, traditional network intrusion detection (NID) methods cannot achieve high accuracy for different types of intrusions. A NID method combining transformer and federated learning (FedL) is proposed for this purpose. First, a multi-party collaborative learning framework was built based on FedL, which achieved data exchange and sharing. Then, by introducing the self-attention mechanism (AttM) to improve the traditional transformer, it could quickly converge. Finally, an NID model integrating transformer and FedL was constructed by combining DNN, GRU, and an encoder module composed of improved transformer, achieving accurate detection of network intrusion. The proposed NID method was compared with the other three methods. The results show that the proposed method has the highest NID accuracy and F1 score on the NSL-KDD and UNSW-NB15 dataset, with the highest accuracy reaching 99.65% and 89.25%, while the F1 score has the highest accuracy, reaching 99.45% and 88.13%, outperforming the other three comparative algorithms in terms of performance.

Related Content

Zhou Li, Gengming Xie, Varsha Arya, Kwok Tai Chui. © 2024. 10 pages.
Ming-Te Chen, Yi Yang Chang, Ta Jen Wu. © 2024. 22 pages.
Mingrui Zhao, Chunjing Shi, Yixiao Yuan. © 2024. 30 pages.
Qi Zhou, Zhoupu Wang. © 2024. 20 pages.
Shunqin Zhang, Sanguo Zhang, Wenduo He, Xuan Zhang. © 2024. 23 pages.
Qi Zhou, Chun Shi. © 2024. 28 pages.
Hao Ma, Zhiyi Gai. © 2024. 27 pages.
Body Bottom