Anomaly Detection in Network Access-Using LSTM and Encoder-Enhanced Generative Adversarial Networks
Abstract
Along with the continuous development of information technology, the database has become an important module for enterprises and individuals to apply computers, and some important data are stored in the database, which also leads to the database becoming the target of malicious intruders. The abnormal access behavior detection algorithm for data can quickly identify abnormal access situations, timely intervention and processing to ensure data security. Based on this, this paper proposes an abnormal defense behavior detection algorithm based on generative adversarial network, the new algorithm has the applicability as well as two derivative models of generative adversarial network for network abnormal access detection with high efficiency. In this paper, we experiment the classification accuracy of network anomaly detection algorithm, i.e., F1, by using three models, namely, the original Generative Adversarial Network (GAN), Generative Adversarial Network using Long and Short-Term Memory Network (GAN+LSTM), and Generative Adversarial Network with the addition of an encoder (GAN+Encoder), and the result of this paper shows that the GAN+Encoder model is the most effective. And based on these three models of the generator and discriminator loss trends are compared, as well as through the iteration of 50 times of training results show that the GAN + Encoder model is relatively simple, and the training time is shorter and more efficient.
Full Text:
PDFReferences
Xu XY, Fan WW, Wang SY, Zhou F. WBIM-GAN: A generative adversarial network based wideband interference mitigation model for synthetic aperture radar. Remote Sens. 2024, 16(5), 910.
Alvi AN, Bakhtiar Ali, Saleh MS, Alkhathami M, Alsadie D, Alghamdi B. Secure computing for fog-enabled industrial IoT. Sensors 2024, 24(7), 2098.
Alqahtani F, Almutairi M, Sheldon FT. Cloud security using fine-grained efficient information flow tracking. Future Internet 2024, 16(4), 110.
Szymanski TH. Open access article a quantum-safe software-defined deterministic internet of Things (IoT) with hardware-enforced cyber-security for critical infrastructures. Information 2024, 15(4), 173.
Riaz M, Dilpazir H, Naseer S, Mahmood H, Anwar A, Khan J, Benitez IB, Ahmad T. Secure and fast image encryption algorithm based on modified logistic map. Information 2024, 15(3), 172.
Chen WJ, Lu CJ, Hsu PT, Yang CT. Research on an optimal maintenance and inventory model based on carbon tax policy. Processes 2024, 12(3), 599.
Shi G, Cheng W, Gao X, Wei FP, Zhang H, Wang QZ. Enhancing security in visible light communication: a Tabu-search-based method for transmitter selection. Sensors 2024, 24(6), 1906.
AlKhonaini A, Sheltami T, Mahmoud A, Imam M. UAV detection using reinforcement learning. Sensors 2024, 24(6), 1870.
Xie Q, Huang JJ. Improvement of a conditional privacy-preserving and desynchronization-resistant authentication protocol for IoV. Appl. Sci. 2024, 14(6), 2451.
Taurshia A, Kathrine JW, Andrew J, Eunice RJ. Securing internet of things applications using software-defined network-aided group key management with a modified one-way function tree. Appl. Sci. 2024, 14(6), 2405.
Sun L, Chen P, Xiang W, Chen P, Gao WY, Zhang KJ. SmartPaint: a co-creative drawing system based on generative adversarial networks. Frontiers of Information Technology & Electronic Engineering 2019, 20 (12): 1644-1657.
Xia LM, Wang H, Guo WT. Gait recognition based on generative adversarial image complementation network (English). Journal of Central South University 2019, 26 (10): 2759-2770.
Zhao CH, WangXP, Yao XF, Tian MH. A local density-based background purification method for hyperspectral anomaly detection (in English). Journal of Central South University 2018, 25 (01): 84-94.
Xiao YJ, Xu WY, Jia ZH, Ma ZR, Qi DL. A non-intrusive power consumption-based anomaly detection scheme for programmable logic controllers (in English). Frontiers of Information Technology & Electronic Engineering 2017, 18 (04): 519-535.
DOI: https://doi.org/10.31449/inf.v49i7.7246

This work is licensed under a Creative Commons Attribution 3.0 License.