Open Access iconOpen Access

ARTICLE

crossmark

Network Intrusion Traffic Detection Based on Feature Extraction

Xuecheng Yu1, Yan Huang2, Yu Zhang1, Mingyang Song1, Zhenhong Jia1,3,*

1 College of Information Science and Engineering, Xinjiang University, Urumqi, 830046, China
2 Network Department, China Mobile Communications Group Xinjiang Co, Ltd. Urumqi, Urumqi, 830011, China
3 Xinjiang Signal Detection and Processing Key Laboratory, Xinjiang University, Urumqi, 830000, China

* Corresponding Author: Zhenhong Jia. Email: email

Computers, Materials & Continua 2024, 78(1), 473-492. https://doi.org/10.32604/cmc.2023.044999

Abstract

With the increasing dimensionality of network traffic, extracting effective traffic features and improving the identification accuracy of different intrusion traffic have become critical in intrusion detection systems (IDS). However, both unsupervised and semisupervised anomalous traffic detection methods suffer from the drawback of ignoring potential correlations between features, resulting in an analysis that is not an optimal set. Therefore, in order to extract more representative traffic features as well as to improve the accuracy of traffic identification, this paper proposes a feature dimensionality reduction method combining principal component analysis and Hotelling’s T2 and a multilayer convolutional bidirectional long short-term memory (MSC_BiLSTM) classifier model for network traffic intrusion detection. This method reduces the parameters and redundancy of the model by feature extraction and extracts the dependent features between the data by a bidirectional long short-term memory (BiLSTM) network, which fully considers the influence between the before and after features. The network traffic is first characteristically downscaled by principal component analysis (PCA), and then the downscaled principal components are used as input to Hotelling’s T2 to compare the differences between groups. For datasets with outliers, Hotelling’s T2 can help identify the groups where the outliers are located and quantitatively measure the extent of the outliers. Finally, a multilayer convolutional neural network and a BiLSTM network are used to extract the spatial and temporal features of network traffic data. The empirical consequences exhibit that the suggested approach in this manuscript attains superior outcomes in precision, recall and F1-score juxtaposed with the prevailing techniques. The results show that the intrusion detection accuracy, precision, and F1-score of the proposed MSC_BiLSTM model for the CIC-IDS 2017 dataset are 98.71%, 95.97%, and 90.22%.

Keywords


Cite This Article

APA Style
Yu, X., Huang, Y., Zhang, Y., Song, M., Jia, Z. (2024). Network intrusion traffic detection based on feature extraction. Computers, Materials & Continua, 78(1), 473-492. https://doi.org/10.32604/cmc.2023.044999
Vancouver Style
Yu X, Huang Y, Zhang Y, Song M, Jia Z. Network intrusion traffic detection based on feature extraction. Computers Materials Continua . 2024;78(1):473-492 https://doi.org/10.32604/cmc.2023.044999
IEEE Style
X. Yu, Y. Huang, Y. Zhang, M. Song, and Z. Jia "Network Intrusion Traffic Detection Based on Feature Extraction," Computers Materials Continua , vol. 78, no. 1, pp. 473-492. 2024. https://doi.org/10.32604/cmc.2023.044999



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 198

    View

  • 177

    Download

  • 0

    Like

Share Link