期刊文献+
共找到245篇文章
< 1 2 13 >
每页显示 20 50 100
HGS-ATD:A Hybrid Graph Convolutional Network-GraphSAGE Model for Anomaly Traffic Detection
1
作者 Zhian Cui Hailong Li Xieyang Shen 《Journal of Harbin Institute of Technology(New Series)》 2026年第1期33-50,共18页
With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a ... With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a promising Deep Learning(DL)approach,has proven to be highly effective in identifying intricate patterns in graph⁃structured data and has already found wide applications in the field of network security.In this paper,we propose a hybrid Graph Convolutional Network(GCN)⁃GraphSAGE model for Anomaly Traffic Detection,namely HGS⁃ATD,which aims to improve the accuracy of anomaly traffic detection by leveraging edge feature learning to better capture the relationships between network entities.We validate the HGS⁃ATD model on four publicly available datasets,including NF⁃UNSW⁃NB15⁃v2.The experimental results show that the enhanced hybrid model is 5.71%to 10.25%higher than the baseline model in terms of accuracy,and the F1⁃score is 5.53%to 11.63%higher than the baseline model,proving that the model can effectively distinguish normal traffic from attack traffic and accurately classify various types of attacks. 展开更多
关键词 anomaly traffic detection graph neural network deep learning graph convolutional network
在线阅读 下载PDF
Multi-Head Attention Enhanced Parallel Dilated Convolution and Residual Learning for Network Traffic Anomaly Detection 被引量:1
2
作者 Guorong Qi Jian Mao +2 位作者 Kai Huang Zhengxian You Jinliang Lin 《Computers, Materials & Continua》 2025年第2期2159-2176,共18页
Abnormal network traffic, as a frequent security risk, requires a series of techniques to categorize and detect it. Existing network traffic anomaly detection still faces challenges: the inability to fully extract loc... Abnormal network traffic, as a frequent security risk, requires a series of techniques to categorize and detect it. Existing network traffic anomaly detection still faces challenges: the inability to fully extract local and global features, as well as the lack of effective mechanisms to capture complex interactions between features;Additionally, when increasing the receptive field to obtain deeper feature representations, the reliance on increasing network depth leads to a significant increase in computational resource consumption, affecting the efficiency and performance of detection. Based on these issues, firstly, this paper proposes a network traffic anomaly detection model based on parallel dilated convolution and residual learning (Res-PDC). To better explore the interactive relationships between features, the traffic samples are converted into two-dimensional matrix. A module combining parallel dilated convolutions and residual learning (res-pdc) was designed to extract local and global features of traffic at different scales. By utilizing res-pdc modules with different dilation rates, we can effectively capture spatial features at different scales and explore feature dependencies spanning wider regions without increasing computational resources. Secondly, to focus and integrate the information in different feature subspaces, further enhance and extract the interactions among the features, multi-head attention is added to Res-PDC, resulting in the final model: multi-head attention enhanced parallel dilated convolution and residual learning (MHA-Res-PDC) for network traffic anomaly detection. Finally, comparisons with other machine learning and deep learning algorithms are conducted on the NSL-KDD and CIC-IDS-2018 datasets. The experimental results demonstrate that the proposed method in this paper can effectively improve the detection performance. 展开更多
关键词 network traffic anomaly detection multi-head attention parallel dilated convolution residual learning
在线阅读 下载PDF
Hybrid deep learning model with VMD-BiLSTM-GRU networks for short-term traffic flow prediction
3
作者 Changxi Ma Yanming Hu Xuecai Xu 《Data Science and Management》 2025年第3期257-269,共13页
Accelerating urbanization and the rapid development of intelligent transportation systems have rendered shortterm traffic flow prediction an important research field.Accurate prediction of traffic flow is beneficial f... Accelerating urbanization and the rapid development of intelligent transportation systems have rendered shortterm traffic flow prediction an important research field.Accurate prediction of traffic flow is beneficial for the optimization of traffic planning,improvement of road utilization,reduction of traffic congestion,and reduction in the incidence of traffic accidents.However,data pertaining to traffic flow are typically influenced by a multitude of factors,resulting in data that exhibit a considerable degree of nonlinearity and complexity.To address the issue of noise in raw traffic flow data,this study proposes a hybrid model that combines variational mode decomposition(VMD),a bidirectional long short-term memory network(BiLSTM),and a gated recurrent unit(GRU)for short-term traffic flow prediction.To validate the effectiveness of the model,an experimental validation was conducted based on traffic flow data from UK highways,and the performance of the model was compared with common benchmark models.The experimental results demonstrate that the proposed method yields superior prediction results in terms of mean absolute error,coefficient of determination,and root-mean-square error compared to existing prediction techniques,thereby substantiating its efficacy in short-term traffic flow prediction. 展开更多
关键词 Deep learning traffic flow prediction Variational mode decomposition Bi-directional long short-term memory networks Gated recurrent units
在线阅读 下载PDF
Improved Social Emotion Optimization Algorithm for Short-Term Traffic Flow Forecasting Based on Back-Propagation Neural Network 被引量:3
4
作者 ZHANG Jun ZHAO Shenwei +1 位作者 WANG Yuanqiang ZHU Xinshan 《Journal of Shanghai Jiaotong university(Science)》 EI 2019年第2期209-219,共11页
The back-propagation neural network(BPNN) is a well-known multi-layer feed-forward neural network which is trained by the error reverse propagation algorithm. It is very suitable for the complex of short-term traffic ... The back-propagation neural network(BPNN) is a well-known multi-layer feed-forward neural network which is trained by the error reverse propagation algorithm. It is very suitable for the complex of short-term traffic flow forecasting; however, BPNN is easy to fall into local optimum and slow convergence. In order to overcome these deficiencies, a new approach called social emotion optimization algorithm(SEOA) is proposed in this paper to optimize the linked weights and thresholds of BPNN. Each individual in SEOA represents a BPNN. The availability of the proposed forecasting models is proved with the actual traffic flow data of the 2 nd Ring Road of Beijing. Experiment of results show that the forecasting accuracy of SEOA is improved obviously as compared with the accuracy of particle swarm optimization back-propagation(PSOBP) and simulated annealing particle swarm optimization back-propagation(SAPSOBP) models. Furthermore, since SEOA does not respond to the negative feedback information, Metropolis rule is proposed to give consideration to both positive and negative feedback information and diversify the adjustment methods. The modified BPNN model, in comparison with social emotion optimization back-propagation(SEOBP) model, is more advantageous to search the global optimal solution. The accuracy of Metropolis rule social emotion optimization back-propagation(MRSEOBP) model is improved about 19.54% as compared with that of SEOBP model in predicting the dramatically changing data. 展开更多
关键词 urban traffic short-term traffic flow forecasting social emotion optimization algorithm(SEOA) back-propagation neural network(BPNN) Metropolis rule
原文传递
Anomaly detection of network traffic based on autocorrelation principle 被引量:1
5
作者 XIONG Wei HU Han-ping YANG Yue 《通讯和计算机(中英文版)》 2007年第8期15-19,23,共6页
Network anomalies caused by network attacks can significantly degrade or even terminate network services.A Real-time and reliable detection of anomalies is essential to rapid anomaly diagnosis,anomaly mitigation,and m... Network anomalies caused by network attacks can significantly degrade or even terminate network services.A Real-time and reliable detection of anomalies is essential to rapid anomaly diagnosis,anomaly mitigation,and malfunction recovering.Unlike most detection methods based on the statistical analysis of the packet headers(Such as IP addresses and ports),a new approach only using network traffic volumes is proposed to detect anomalies reliably.Our method is based on autocorrelation function to judge whether anomalies have happened.In details,the correlation coefficients of normal and anomaly data fluctuate slightly respectively,while those of the overlapped data composed of them fluctuate greatly.Experimental results on network traffic volumes transformed from 1999 DARPA intrusion evaluation data set show that this method can effectively detect network anomalies,while avoiding the high false alarms rate. 展开更多
关键词 network traffic volume anomaly detection autocorrelation function
在线阅读 下载PDF
RRCNN: Request Response-Based Convolutional Neural Network for ICS Network Traffic Anomaly Detection
6
作者 Yan Du Shibin Zhang +6 位作者 Guogen Wan Daohua Zhou Jiazhong Lu Yuanyuan Huang Xiaoman Cheng Yi Zhang Peilin He 《Computers, Materials & Continua》 SCIE EI 2023年第6期5743-5759,共17页
Nowadays,industrial control system(ICS)has begun to integrate with the Internet.While the Internet has brought convenience to ICS,it has also brought severe security concerns.Traditional ICS network traffic anomaly de... Nowadays,industrial control system(ICS)has begun to integrate with the Internet.While the Internet has brought convenience to ICS,it has also brought severe security concerns.Traditional ICS network traffic anomaly detection methods rely on statistical features manually extracted using the experience of network security experts.They are not aimed at the original network data,nor can they capture the potential characteristics of network packets.Therefore,the following improvements were made in this study:(1)A dataset that can be used to evaluate anomaly detection algorithms is produced,which provides raw network data.(2)A request response-based convolutional neural network named RRCNN is proposed,which can be used for anomaly detection of ICS network traffic.Instead of using statistical features manually extracted by security experts,this method uses the byte sequences of the original network packets directly,which can extract potential features of the network packets in greater depth.It regards the request packet and response packet in a session as a Request-Response Pair(RRP).The feature of RRP is extracted using a one-dimensional convolutional neural network,and then the RRP is judged to be normal or abnormal based on the extracted feature.Experimental results demonstrate that this model is better than several other machine learning and neural network models,with F1,accuracy,precision,and recall above 99%. 展开更多
关键词 Industrial control system(ICS) DATASET network traffic anomaly detection
在线阅读 下载PDF
A Method for Detecting Wide-scale Network Traffic Anomalies
7
作者 Wang Minghua 《ZTE Communications》 2007年第4期19-23,共5页
Network traffic anomalies refer to the traffic changed abnormally and obviously.Local events such as temporary network congestion,Distributed Denial of Service(DDoS)attack and large-scale scan,or global events such as... Network traffic anomalies refer to the traffic changed abnormally and obviously.Local events such as temporary network congestion,Distributed Denial of Service(DDoS)attack and large-scale scan,or global events such as abnormal network routing,can cause network anomalies.Network anomaly detection and analysis are very important to Computer Security Incident Response Teams(CSIRT).But wide-scale traffic anomaly detection requires extracting anomalous modes from large amounts of high-dimensional noise-rich data,and interpreting the modes;so,it is very difficult.This paper proposes a general method based on Principle Component Analysis(PCA)to analyze network anomalies.This method divides the traffic matrix into normal and anomalous subspaces,maps traffic vectors into the normal subspace,gets the distance from detected vector to average normal vector,and detects anomalies based on that distance. 展开更多
关键词 A Method for Detecting Wide-scale network traffic Anomalies DDOS Security PCA
在线阅读 下载PDF
Traffic prediction enabled dynamic access points switching for energy saving in dense networks 被引量:2
8
作者 Yuchao Zhu Shaowei Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第4期1023-1031,共9页
To meet the ever-increasing traffic demand and enhance the coverage of cellular networks,network densification is one of the crucial paradigms of 5G and beyond mobile networks,which can improve system capacity by depl... To meet the ever-increasing traffic demand and enhance the coverage of cellular networks,network densification is one of the crucial paradigms of 5G and beyond mobile networks,which can improve system capacity by deploying a large number of Access Points(APs)in the service area.However,since the energy consumption of APs generally accounts for a substantial part of the communication system,how to deal with the consequent energy issue is a challenging task for a mobile network with densely deployed APs.In this paper,we propose an intelligent AP switching on/off scheme to reduce the system energy consumption with the prerequisite of guaranteeing the quality of service,where the signaling overhead is also taken into consideration to ensure the stability of the network.First,based on historical traffic data,a long short-term memory method is introduced to predict the future traffic distribution,by which we can roughly determine when the AP switching operation should be triggered;second,we present an efficient three-step AP selection strategy to determine which of the APs would be switched on or off;third,an AP switching scheme with a threshold is proposed to adjust the switching frequency so as to improve the stability of the system.Experiment results indicate that our proposed traffic forecasting method performs well in practical scenarios,where the normalized root mean square error is within 10%.Furthermore,the achieved energy-saving is more than 28% on average with a reasonable outage probability and switching frequency for an area served by 40 APs in a commercial mobile network. 展开更多
关键词 Access points switching on/off ENERGY-SAVING Green network Long short-term memory traffic prediction
在线阅读 下载PDF
An Efficient Correlation-Aware Anomaly Detection Framework in Cellular Network 被引量:2
9
作者 Haihan Nan Xiaoyan Zhu Jianfeng Ma 《China Communications》 SCIE CSCD 2022年第8期168-180,共13页
Nowadays,the fifth-generation(5G)mobile communication system has obtained prosperous development and deployment,reshaping our daily lives.However,anomalies of cell outages and congestion in 5G critically influence the... Nowadays,the fifth-generation(5G)mobile communication system has obtained prosperous development and deployment,reshaping our daily lives.However,anomalies of cell outages and congestion in 5G critically influence the quality of experience and significantly increase operational expenditures.Although several big data and artificial intelligencebased anomaly detection methods have been proposed for wireless cellular systems,they change distributions of the data and ignore the relevance among user activities,causing anomaly detection ineffective for some cells.In this paper,we propose a highly effective and accurate anomaly detection framework by utilizing generative adversarial networks(GAN)and long short-term memory(LSTM)neural networks.The framework expands the original dataset while simultaneously keeping the distribution of data unchanged,and explores the relevance among user activities to further improve the system performance.The results demonstrate that our framework can achieve 97.16%accuracy and 2.30%false positive rate by utilizing the correlation of user activities and data expansion. 展开更多
关键词 cellular network anomaly detection generative adversarial networks(GAN) long short-term memory(LSTM) call detail record(CDR)
在线阅读 下载PDF
An Aircraft Trajectory Anomaly Detection Method Based on Deep Mixture Density Network 被引量:1
10
作者 CHEN Lijing ZENG Weili YANG Zhao 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第5期840-851,共12页
The timely and accurately detection of abnormal aircraft trajectory is critical to improving flight safety.However,the existing anomaly detection methods based on machine learning cannot well characterize the features... The timely and accurately detection of abnormal aircraft trajectory is critical to improving flight safety.However,the existing anomaly detection methods based on machine learning cannot well characterize the features of aircraft trajectories.Low anomaly detection accuracy still exists due to the high-dimensionality,heterogeneity and temporality of flight trajectory data.To this end,this paper proposes an abnormal trajectory detection method based on the deep mixture density network(DMDN)to detect flights with unusual data patterns and evaluate flight trajectory safety.The technique consists of two components:Utilization of the deep long short-term memory(LSTM)network to encode features of flight trajectories effectively,and parameterization of the statistical properties of flight trajectory using the Gaussian mixture model(GMM).Experiment results on Guangzhou Baiyun International Airport terminal airspace show that the proposed method can effectively capture the statistical patterns of aircraft trajectories.The model can detect abnormal flights with elevated risks and its performance is superior to two mainstream methods.The proposed model can be used as an assistant decision-making tool for air traffic controllers. 展开更多
关键词 aircraft trajectory anomaly detection mixture density network long short-term memory(LSTM) Gaussian mixture model(GMM)
在线阅读 下载PDF
Network Traffic Prediction Using Radial Kernelized-Tversky Indexes-Based Multilayer Classifier
11
作者 M.Govindarajan V.Chandrasekaran S.Anitha 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期851-863,共13页
Accurate cellular network traffic prediction is a crucial task to access Internet services for various devices at any time.With the use of mobile devices,communication services generate numerous data for every moment.... Accurate cellular network traffic prediction is a crucial task to access Internet services for various devices at any time.With the use of mobile devices,communication services generate numerous data for every moment.Given the increasing dense population of data,traffic learning and prediction are the main components to substantially enhance the effectiveness of demand-aware resource allocation.A novel deep learning technique called radial kernelized LSTM-based connectionist Tversky multilayer deep structure learning(RKLSTM-CTMDSL)model is introduced for traffic prediction with superior accuracy and minimal time consumption.The RKLSTM-CTMDSL model performs attribute selection and classification processes for cellular traffic prediction.In this model,the connectionist Tversky multilayer deep structure learning includes multiple layers for traffic prediction.A large volume of spatial-temporal data are considered as an input-to-input layer.Thereafter,input data are transmitted to hidden layer 1,where a radial kernelized long short-term memory architecture is designed for the relevant attribute selection using activation function results.After obtaining the relevant attributes,the selected attributes are given to the next layer.Tversky index function is used in this layer to compute similarities among the training and testing traffic patterns.Tversky similarity index outcomes are given to the output layer.Similarity value is used as basis to classify data as heavy network or normal traffic.Thus,cellular network traffic prediction is presented with minimal error rate using the RKLSTM-CTMDSL model.Comparative evaluation proved that the RKLSTM-CTMDSL model outperforms conventional methods. 展开更多
关键词 Cellular network traffic prediction connectionist Tversky multilayer deep structure learning attribute selection classification radial kernelized long short-term memory
在线阅读 下载PDF
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy
12
作者 Yuji Waizumi Hiroshi Tsunoda +1 位作者 Masashi Tsuji Yoshiaki Nemoto 《Journal of Information Security》 2012年第1期18-24,共7页
Because of an explosive growth of the intrusions, necessity of anomaly-based Intrusion Detection Systems (IDSs) which are capable of detecting novel attacks, is increasing. Among those systems, flow-based detection sy... Because of an explosive growth of the intrusions, necessity of anomaly-based Intrusion Detection Systems (IDSs) which are capable of detecting novel attacks, is increasing. Among those systems, flow-based detection systems which use a series of packets exchanged between two terminals as a unit of observation, have an advantage of being able to detect anomaly which is included in only some specific sessions. However, in large-scale networks where a large number of communications takes place, analyzing every flow is not practical. On the other hand, a timeslot-based detection systems need not to prepare a number of buffers although it is difficult to specify anomaly communications. In this paper, we propose a multi-stage anomaly detection system which is combination of timeslot-based and flow-based detectors. The proposed system can reduce the number of flows which need to be subjected to flow-based analysis but yet exhibits high detection accuracy. Through experiments using data set, we present the effectiveness of the proposed method. 展开更多
关键词 network anomaly Detection Timeslot-Based ANALYSIS Flow-Based ANALYSIS MULTI-STAGE traffic ANALYSIS FLOW Reduction
暂未订购
Intelligent Detection of Abnormal Traffic Based on SCN-BiLSTM
13
作者 Lulu Zhang Xuehui Du +3 位作者 Wenjuan Wang Yu Cao Xiangyu Wu Shihao Wang 《Computers, Materials & Continua》 2025年第7期1901-1919,共19页
To address the limitations of existing abnormal traffic detection methods,such as insufficient temporal and spatial feature extraction,high false positive rate(FPR),poor generalization,and class imbalance,this study p... To address the limitations of existing abnormal traffic detection methods,such as insufficient temporal and spatial feature extraction,high false positive rate(FPR),poor generalization,and class imbalance,this study proposed an intelligent detection method that combines a Stacked Convolutional Network(SCN),Bidirectional Long Short-Term Memory(BiLSTM)network,and Equalization Loss v2(EQL v2).This method was divided into two components:a feature extraction model and a classification and detection model.First,SCN was constructed by combining a Convolutional Neural Network(CNN)with a Depthwise Separable Convolution(DSC)network to capture the abstract spatial features of traffic data.These features were then input into the BiLSTM to capture temporal dependencies.An attention mechanism was incorporated after SCN and BiLSTM to enhance the extraction of key spatiotemporal features.To address class imbalance,the classification detection model applied EQL v2 to adjust the weights of the minority classes,ensuring that they received equal focus during training.The experimental results indicated that the proposed method outperformed the existing methods in terms of accuracy,FPR,and F1-score and significantly improved the identification rate of minority classes. 展开更多
关键词 Convolutional neural network depthwise separable convolution bidirectional long and short-term memory network class imbalance abnormal traffic detection
在线阅读 下载PDF
基于多尺度卷积和通道注意力机制的网络流量异常检测方法
14
作者 付钰 王玉珏 +2 位作者 俞艺涵 刘涛涛 安义帅 《通信学报》 北大核心 2026年第1期184-200,共17页
针对传统网络流量异常检测方法受限于模型表达能力较弱、数据类不平衡等问题,提出了一种融合多尺度卷积与通道注意力机制的网络流量异常检测方法。首先,设计金字塔卷积模块捕捉网络流量的多尺度特征,有效提升分类性能;其次,利用通道注... 针对传统网络流量异常检测方法受限于模型表达能力较弱、数据类不平衡等问题,提出了一种融合多尺度卷积与通道注意力机制的网络流量异常检测方法。首先,设计金字塔卷积模块捕捉网络流量的多尺度特征,有效提升分类性能;其次,利用通道注意力机制增强模型对异常流量敏感特征的通道响应,提高特征的可辨别性,从而抑制噪声干扰;最后,通过改进均衡损失函数调整不同类别权重系数,从而缓解数据集中的类不平衡问题。在NSL-KDD和CIC-IDS-2017数据集上开展了一系列实验,实验结果表明,所提方法取得了较好的分类结果,准确率分别为99.45%和99.95%,同时误报率仅为0.50%和0.02%。 展开更多
关键词 网络流量异常检测 多尺度卷积 注意力机制 均衡损失函数
在线阅读 下载PDF
DiffGuard:基于扩散模型与自适应序列学习的网络流量异常检测框架
15
作者 胡文涛 丁伟杰 《信息网络安全》 北大核心 2026年第3期378-388,共11页
针对传统深度学习方法在处理高维、动态网络流量时的检测瓶颈,文章提出一种无监督网络流量异常检测框架DiffGuard。该框架将异常检测重构为生成式修复任务,区别于基于重构的方法,其核心在于融合扩散模型的生成式去噪能力与自适应序列建... 针对传统深度学习方法在处理高维、动态网络流量时的检测瓶颈,文章提出一种无监督网络流量异常检测框架DiffGuard。该框架将异常检测重构为生成式修复任务,区别于基于重构的方法,其核心在于融合扩散模型的生成式去噪能力与自适应序列建模技术。DiffGuard通过以输入序列上下文为条件的反向去噪过程,从潜在异常序列中恢复其正常形态,并以修复前后的重构误差量化异常程度。为增强时序建模,DiffGuard引入基于Transformer的条件编码器捕捉长期依赖,同时,设计基于流量熵的自适应序列长度机制,动态调整分析窗口以适应流量变化。实验结果表明,DiffGuard在CIC-IDS-2018数据集上的F1分数达到0.965,优于其他主流方法,且在Web渗透等隐蔽攻击检测上的F1分数达到0.955。实验结果验证了DiffGuard在复杂网络安全场景中的有效性与应用潜力。 展开更多
关键词 网络安全 异常检测 扩散模型 无监督学习 流量分析
在线阅读 下载PDF
基于改进鱼鹰优化算法及其在短期网络流量异常检测中的应用
16
作者 高翔 赵梦玲 殷新宇 《云南大学学报(自然科学版)》 北大核心 2026年第2期227-239,共13页
为了有效处理网络流量数据的随机性和不稳定性对数据传输的影响,首先通过主成分分析(principal component analysis,PCA)对网络流量数据进行特征降维,以提升数据的质量和稳定性;其次,引入Tent混沌映射、动态反向学习和自适应步长策略对... 为了有效处理网络流量数据的随机性和不稳定性对数据传输的影响,首先通过主成分分析(principal component analysis,PCA)对网络流量数据进行特征降维,以提升数据的质量和稳定性;其次,引入Tent混沌映射、动态反向学习和自适应步长策略对鱼鹰优化算法进行改进,改进后的鱼鹰优化算法(improved osprey optimization algorithm,IOOA)提高了全局搜索能力和局部搜索精度,同时增强了跳出局部最优值的能力;然后,使用改进鱼鹰优化算法精细优化深度极限学习机(deep extreme learning machine,DELM)参数;再次,构建PCA-IOOA-DELM多步短期网络流量异常检测模型;最后,将该模型用于网络流量的分类与异常检测.仿真实验结果表明,相较于其它检测模型,提出的PCA-IOOA-DELM检测模型在短期网络流量异常检测的准确性和精确度方面均展现出显著优势,有效地提高了异常流量的识别能力. 展开更多
关键词 改进鱼鹰优化算法 深度极限学习机 短期网络流量异常 主成分分析
在线阅读 下载PDF
融合神经网络的时序依赖性网络行为实时异常溯源监控框架研究
17
作者 丁巨 《信息与电脑》 2026年第6期69-71,共3页
入侵检测系统(Intrusion Detection System,IDS)被认为是组织网络安全最重要的组成部分之一。这是因为IDS是组织抵御多种网络攻击的第一道防线,负责准确检测任何可能的网络入侵。IDS的多种实现方式可在整个流程中检测潜在威胁。传统入... 入侵检测系统(Intrusion Detection System,IDS)被认为是组织网络安全最重要的组成部分之一。这是因为IDS是组织抵御多种网络攻击的第一道防线,负责准确检测任何可能的网络入侵。IDS的多种实现方式可在整个流程中检测潜在威胁。传统入侵检测系统往往难以提供准确的实时入侵检测,同时无法跟上不断变化的威胁环境。针对现有问题,文章利用CICIDS 2017数据集开展网络流量分析,提出一种深度神经网络与决策森林相结合(Deep Neural Network-Ensemble of Multimodal Decision Forests,DNN-EMF)的模型。该模型通过CICIDS 2017数据集训练,在深层构建潜在特征表示,最终以99.96%的精度显著优于参考方法。 展开更多
关键词 入侵检测系统 网络流量异常检测 异常溯源监控框架
在线阅读 下载PDF
软件定义网络环境下流量调度与安全防护策略研究
18
作者 李晓霞 《黑龙江科学》 2026年第2期136-139,共4页
针对软件定义网络(SDN)中控制平面与数据平面解耦带来的流量集中调度与安全防护需求,统筹考虑带宽分配、链路负载和时延等核心要点,创建了针对不同业务类型的流量调度机制,引入具备异常检测和动态策略更新功能的安全防护框架,研究运用... 针对软件定义网络(SDN)中控制平面与数据平面解耦带来的流量集中调度与安全防护需求,统筹考虑带宽分配、链路负载和时延等核心要点,创建了针对不同业务类型的流量调度机制,引入具备异常检测和动态策略更新功能的安全防护框架,研究运用改良的多路径选择及带宽公平分配策略,联合基于流量特征的入侵检测与动态响应机制,评估调度与防护协同下的性能状况。模拟实验结果证实,该策略能在提升网络吞吐能力、降低端到端时间延迟的同时提高异常流量检测比率和防御策略执行成功率,实现高效调度和安全防护的协同优化。 展开更多
关键词 软件定义网络 流量调度 安全防护 异常检测
在线阅读 下载PDF
基于深度强化学习的网络异常流量检测模型
19
作者 苏玉龙 《无线互联科技》 2026年第3期38-42,共5页
随着网络环境的复杂化与攻击手段的多样化,传统的异常流量检测方法在动态适应性与识别精度方面存在局限。为解决这一问题,文章构建了一种基于深度强化学习的网络异常流量检测模型。该模型利用强化学习的智能决策能力与深度神经网络的特... 随着网络环境的复杂化与攻击手段的多样化,传统的异常流量检测方法在动态适应性与识别精度方面存在局限。为解决这一问题,文章构建了一种基于深度强化学习的网络异常流量检测模型。该模型利用强化学习的智能决策能力与深度神经网络的特征表达能力,协同建模检测策略。模型设计包括状态空间的构建、动作定义及奖励机制的设定,旨在针对高维网络数据实现高效识别。实验结果表明,该模型在检测准确率和适应性方面优于现有方法。 展开更多
关键词 网络安全 异常检测 深度强化学习 流量分析
在线阅读 下载PDF
基于卷积神经网络和知识蒸馏的网络异常流量检测方法
20
作者 陈娟 王寒野 +1 位作者 王占丰 葛先玉 《信息对抗技术》 2026年第2期112-126,共15页
现有网络异常流量检测方法在应对高维复杂流量特征时,普遍面临特征学习能力薄弱、模型参数量冗余2大问题。为此,提出一种融合一维卷积神经网络与知识蒸馏的异常流量检测方法AdaCBAM-LCRS-BOKD。设计基于自适应卷积注意力模块的AdaCBAM-1... 现有网络异常流量检测方法在应对高维复杂流量特征时,普遍面临特征学习能力薄弱、模型参数量冗余2大问题。为此,提出一种融合一维卷积神经网络与知识蒸馏的异常流量检测方法AdaCBAM-LCRS-BOKD。设计基于自适应卷积注意力模块的AdaCBAM-1D-CNN作为教师模型,通过自适应卷积核空间注意力和双重池化通道注意力提升特征学习能力;构建轻量化通道压缩网络LCRS-1D-CNN作为学生模型,引入基于贝叶斯优化的动态温度衰减蒸馏策略(BOKD)进行知识蒸馏,在保证流量检测精度的同时压缩学生模型参数。在CICUNSW-NB15与CIC-IDS2017数据集上的实验结果表明:蒸馏后的学生模型参数占用内存均低于2.5 MB,检测准确率分别达0.9112和0.9954,较蒸馏前有所提升,性能逼近教师模型。该方法实现了检测性能与模型效率的动态平衡,为轻量化异常流量检测提供了有效的技术方案。 展开更多
关键词 网络安全 异常流量检测 一维卷积神经网络 注意力机制 知识蒸馏
在线阅读 下载PDF
上一页 1 2 13 下一页 到第
使用帮助 返回顶部