• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yin Shenglin, Zhang Xinglan, Zuo Liyu. Intrusion Detection System for Dual Route Deep Capsule Network[J]. Journal of Computer Research and Development, 2022, 59(2): 418-429. DOI: 10.7544/issn1000-1239.20200825
Citation: Yin Shenglin, Zhang Xinglan, Zuo Liyu. Intrusion Detection System for Dual Route Deep Capsule Network[J]. Journal of Computer Research and Development, 2022, 59(2): 418-429. DOI: 10.7544/issn1000-1239.20200825

Intrusion Detection System for Dual Route Deep Capsule Network

Funds: This work was supported by the National Natural Science Foundation of China (61801008).
More Information
  • Published Date: January 31, 2022
  • The combination of deep learning and intrusion detection has become a hot topic in cyberspace security. In unstable network security situation, how to accurately detect abnormal traffic is an important task for intrusion detection. Each sample in the intrusion data contains multiple features, but not every feature can determine the final nature of the sample. Some features will even affect the judgment ability of the model. To solve this problem, an intrusion detection model based on residuals of a double routing deep capsule network is proposed. The model uses a deep capsule network to enhance the identification and extraction of features, which can extract higher dimensional data features. A hybrid attention mechanism is used to process the raw data so that the model focuses on features with high impact factors. The model captures the features based on vector representation and clusters the features in multiple directions by a dual routing algorithm. It adopts two strategies, namely residual connectivity and noise capsules, to stabilize the dynamic routing process to mitigate the interference of noisy features. Finally, experiments are conducted on the NSL-KDD dataset and CICIDS2017 dataset, and the results show that the accuracy is up to 90.31% and 99.23%, respectively.
  • Related Articles

    [1]Li Song, Cao Wenqi, Hao Xiaohong, Zhang Liping, Hao Zhongxiao. Collective Spatial Keyword Query Based on Time-Distance Constrained and Cost Aware[J]. Journal of Computer Research and Development, 2025, 62(3): 808-819. DOI: 10.7544/issn1000-1239.202330815
    [2]Bao Han, Wang Yijie. A Fast Construction Method of the Erasure Code with Small Cross-Cloud Data Center Repair Traffic[J]. Journal of Computer Research and Development, 2023, 60(10): 2418-2439. DOI: 10.7544/issn1000-1239.202220580
    [3]Bi Xiuli, Yan Wuqing, Qiu Yumeng, Xiao Bin, Li Weisheng, Ma Jianfeng. Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image[J]. Journal of Computer Research and Development, 2022, 59(6): 1356-1369. DOI: 10.7544/issn1000-1239.20200995
    [4]Pu Yonglin, Yu Jiong, Lu Liang, Li Ziyang, Guo Binglei, Liao Bin. Energy-Efficient Strategy Based on Data Recovery in Storm[J]. Journal of Computer Research and Development, 2021, 58(3): 479-496. DOI: 10.7544/issn1000-1239.2021.20200489
    [5]Tang Yingjie, Wang Fang, Xie Yanwen. An Efficient Failure Reconstruction Based on In-Network Computing for Erasure-Coded Storage Systems[J]. Journal of Computer Research and Development, 2019, 56(4): 767-778. DOI: 10.7544/issn1000-1239.2019.20170834
    [6]Fu Yingxun, Wen Shilin, Ma Li, Shu Jiwu. Survey on Single Disk Failure Recovery Methods for Erasure Coded Storage Systems[J]. Journal of Computer Research and Development, 2018, 55(1): 1-13. DOI: 10.7544/issn1000-1239.2018.20160506
    [7]Huang Jianzhong, Cao Qiang, Huang Siti, Xie Changsheng. Concurrent Node Reconstruction for Erasure-Coded Storage Clusters[J]. Journal of Computer Research and Development, 2016, 53(9): 1918-1929. DOI: 10.7544/issn1000-1239.2016.20150075
    [8]Wei Qiang, Wu Zehui, and Wang Qingxian. Plaintext Recovery Based on Memory Dependence Measurement[J]. Journal of Computer Research and Development, 2014, 51(7): 1547-1554.
    [9]Xiao Fangxiong, Huang Zhiqiu, Cao Zining, Yuan Min, and Zhang Junhua. Describing and Cost Analyzing of Web Services Composition Using PPA[J]. Journal of Computer Research and Development, 2009, 46(5): 832-840.
    [10]He Xiaoyang and Wang Yasha. Model-Based Methods for Software Cost Estimation[J]. Journal of Computer Research and Development, 2006, 43(5): 777-783.
  • Cited by

    Periodical cited type(2)

    1. 陈燕菲,刘三民. 面向特征演化数据流的增量学习方法研究. 重庆工商大学学报(自然科学版). 2025(01): 94-104 .
    2. 张震宇,姜远. 面向特征演变环境的标记噪声鲁棒学习算法. 计算机研究与发展. 2023(08): 1740-1753 . 本站查看

    Other cited types(1)

Catalog

    Article views (361) PDF downloads (195) Cited by(3)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return