Security Detection Design for Laboratory Networks Based on Enhanced LSTM and AdamW Algorithms

Security Detection Design for Laboratory Networks Based on Enhanced LSTM and AdamW Algorithms

Guiwen Jiang
DOI: 10.4018/IJITSA.319721
Article PDF Download
Open access articles are freely available for download

Abstract

With the addition of multimedia big data, the diversification of network data types becomes more prominent, the proportion of unstructured data increases sharply, and the requirements of data application show the characteristics of rapid change. Laboratory servers hold a large amount of core experimental data, which is at risk of being compromised in the event of a cyberattack, and the rapid pace of information technology has made cyberattacks complex. In the face of the great challenges posed by continuously changing networks to network security, this paper proposes a network exception detection approach that combines an improved inception module incorporating an attention mechanism and a Bi-LSTM. The inception module with the attention mechanism enhances the adaptability of the neural network to different spatial feature scales in the network stream, weakens irrelevant non-critical features, and exploits the advantages of the Bi-LSTM in terms of temporal features of the network stream to effectively improve the accuracy of the detection of network attacks.
Article Preview
Top

The changing pattern of cyber-attacks has increased the difficulty of detecting network traffic anomalies. Based on the enabling effect of artificial intelligence, cyberspace security faces new risks, which include increasingly intelligent cyber-attacks, more frequent large-scale attacks, more covert cyber-attacks, more adversarial gaming of cyber-attacks, and increasing vulnerability to the theft of important data. Maintaining network security is both an offensive and defensive game. Network traffic anomaly detection, as a prerequisite for ensuring network security, is receiving more attention because it can identify unknown network attacks. Therefore, it is key to understand how to build an intelligent and efficient network anomaly traffic detection model.

Complete Article List

Search this Journal:
Reset
Volume 17: 1 Issue (2024)
Volume 16: 3 Issues (2023)
Volume 15: 3 Issues (2022)
Volume 14: 2 Issues (2021)
Volume 13: 2 Issues (2020)
Volume 12: 2 Issues (2019)
Volume 11: 2 Issues (2018)
Volume 10: 2 Issues (2017)
Volume 9: 2 Issues (2016)
Volume 8: 2 Issues (2015)
Volume 7: 2 Issues (2014)
Volume 6: 2 Issues (2013)
Volume 5: 2 Issues (2012)
Volume 4: 2 Issues (2011)
Volume 3: 2 Issues (2010)
Volume 2: 2 Issues (2009)
Volume 1: 2 Issues (2008)
View Complete Journal Contents Listing