2021
DOI: 10.1155/2021/9486949
|View full text |Cite
|
Sign up to set email alerts
|

Network Intrusion Detection Model Based on Improved BYOL Self-Supervised Learning

Abstract: The combination of deep learning and intrusion detection has become a hot topic in today’s network security. In the face of massive, high-dimensional network traffic with uneven sample distribution, how to be able to accurately detect anomalous traffic is the primary task of intrusion detection. Most research on intrusion detection systems based on network anomalous traffic detection has focused on supervised learning; however, the process of obtaining labeled data often requires a lot of time and effort, as w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 45 publications
0
13
0
Order By: Relevance
“…However, the model has a limited data mining ability and a poor detection effect on small datasets. Wang et al 23 proposed a new data augmentation strategy for intrusion detection data and an intrusion detection model based on label‐free self‐supervised learning, respectively. The disadvantage of this model is that it is less accurate than the supervised model and requires extensive analysis of the unsupervised processing results.…”
Section: Related Workmentioning
confidence: 99%
“…However, the model has a limited data mining ability and a poor detection effect on small datasets. Wang et al 23 proposed a new data augmentation strategy for intrusion detection data and an intrusion detection model based on label‐free self‐supervised learning, respectively. The disadvantage of this model is that it is less accurate than the supervised model and requires extensive analysis of the unsupervised processing results.…”
Section: Related Workmentioning
confidence: 99%
“…Computer vision technology involves a relatively large number of disciplines and technologies and usually requires the study of the technology from multiple perspectives to achieve the development of computer vision technology. The goal of computer vision technology is to achieve human-like recognition and processing of images to obtain intelligent data, but the current technology is not able to achieve such an image acquisition effect, which requires continuous research from multiple perspectives [14]. First, the main purpose of vision technology is to achieve the recognition and processing of images, so the first task is to achieve a technological breakthrough in the image equipment.…”
Section: Related Workmentioning
confidence: 99%
“…Other scholars use reinforcement learning to sample the training data set and motivate the detection results [30], use generative adversarial networks (GAN) to generate few-class attacks [24], and use Transformer to build a more complex classification model [23]. Unsupervised learning is mainly self-supervised Learning (SSL), which creates supervised information through data augmentation, pre-trains large-scale unlabeled network flow, which obtains the features of different network traffic [46].…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…Some scholars have also introduced contrastive learning to improve model performance in intrusion detection. Wang et al [46] proposed a new data augmentation strategy for intrusion detection data and an intrusion detection model based on unlabeled self-supervised learning, using the new data augmentation strategy to introduce a perturbation augmentation model to learn invariant feature representation capabilities and improve BYOL selfsupervision. The learning method is trained on the unlabeled UNSW-NB15 intrusion detection dataset to extract network traffic feature representations.…”
Section: Contrastive Learningmentioning
confidence: 99%