Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Domain transfer intrusion detection method for unknown attacks on industrial control systems
Haoran WANG, Dan YU, Yuli YANG, Yao MA, Yongle CHEN
Journal of Computer Applications    2024, 44 (4): 1158-1165.   DOI: 10.11772/j.issn.1001-9081.2023050566
Abstract142)   HTML0)    PDF (2452KB)(91)       Save

Aiming at the problems of lack of Industrial Control System (ICS) data and poor detection of unknown attacks by industrial control intrusion detection systems, an unknown attack intrusion detection method for industrial control systems based on Generative Adversarial Transfer Learning network (GATL) was proposed. Firstly, causal inference and cross-domain feature mapping relations were introduced to reconstruct the data to improve its understandability and reliability. Secondly, due to the data imbalance between source domain and target domain, domain confusion-based conditional Generative Adversarial Network (GAN) was used to increase the size and diversity of the target domain dataset. Finally, the differences and commonalities of the data were fused through domain adversarial transfer learning to improve the detection and generalization capabilities of the industrial control intrusion detection model for unknown attacks in the target domain. The experimental results show that on the standard dataset of industrial control network, GATL has an average F1-score of 81.59% in detecting unknown attacks in the target domain while maintaining a high detection rate of known attacks, which is 63.21 and 64.04 percentage points higher than the average F1-score of Dynamic Adversarial Adaptation Network (DAAN) and Information-enhanced Adversarial Domain Adaptation (IADA) method, respectively.

Table and Figures | Reference | Related Articles | Metrics
Network intrusion detection model based on efficient federated learning algorithm
Shaochen HAO, Zizuan WEI, Yao MA, Dan YU, Yongle CHEN
Journal of Computer Applications    2023, 43 (4): 1169-1175.   DOI: 10.11772/j.issn.1001-9081.2022020305
Abstract493)   HTML21)    PDF (1650KB)(450)       Save

After the introduction of federated learning technology in intrusion detection scenarios, there is a problem that the traffic data between nodes is non-independent and identically distributed (non-iid), which makes it difficult for models to aggregate and obtain a high recognition rate. To solve this problem, an efficient federated learning algorithm named H?E?Fed was constructed, and a network intrusion detection model based on this algorithm was proposed. Firstly, a global model for traffic data was designed by the coordinator and was sent to the intrusion detection nodes for model training. Then, by the coordinator, the local models were collected and the skewness of the covariance matrix of the local models between nodes was evaluated, so as to measure the correlation of models between nodes, thereby reassigning model aggregation parameters and generating a new global model. Finally, multiple rounds of interactions between the coordinator and the nodes were carried out until the global model converged. Experimental results show that compared with the models based on FedAvg (Federated Averaging) algorithm and FedProx algorithm, under data non-iid phenomenon between nodes, the proposed model has the communication consumption relatively low. And on KDDCup99 dataset and CICIDS2017 dataset, compared with baseline models, the proposed model has the accuracy improved by 10.39%, 8.14% and 4.40%, 5.98% respectively.

Table and Figures | Reference | Related Articles | Metrics
Text adversarial example generation method based on BERT model
Yuhang LI, Yuli YANG, Yao MA, Dan YU, Yongle CHEN
Journal of Computer Applications    2023, 43 (10): 3093-3098.   DOI: 10.11772/j.issn.1001-9081.2022091468
Abstract339)   HTML21)    PDF (971KB)(230)       Save

Aiming at the problem that the existing adversarial example generation methods require a lot of queries to the target model, which leads to poor attack effects, a Text Adversarial Examples Generation Method based on BERT (Bidirectional Encoder Representations from Transformers) model (TAEGM) was proposed. Firstly, the attention mechanism was adopted to locate the keywords that significantly influence the classification results without query of the target model. Secondly, word-level perturbation of keywords was performed by BERT model to generate candidate adversarial examples. Finally, the candidate examples were clustered, and the adversarial examples were selected from the clusters that have more influence on the classification results. Experimental results on Yelp Reviews, AG News, and IMDB Review datasets show that compared to the suboptimal adversarial example generation method CLARE (ContextuaLized AdversaRial Example generation model) on Success Rate (SR), TAEGM can reduce the Query Counts (QC) to the target model by 62.3% and time consumption by 68.6% averagely while ensuring the SR of adversarial attacks. Based on the above, further experimental results verify that the adversarial examples generated by TAEGM not only have good transferability, but also improve the robustness of the model through adversarial training.

Table and Figures | Reference | Related Articles | Metrics
Mixed C/S and B/S architecture pattern based on AJAX
Xian-jun LI Bo LIU Dan YU Shi-long MA
Journal of Computer Applications   
Abstract1182)      PDF (801KB)(1034)       Save
On the basis of analyzing the mixed Client/Server (C/S) and Browser/Server (B/S) architecture pattern and AJAX technology, a novel mixed architecture pattern was proposed, which can unify the foreground interaction method of B/S and C/S and make the servers share effectively, thus enhance the scalability and maintainability of the system. According to the proposed pattern, the architecture of the spacecraft dynamical application platform was given, as a reference to the system with similar architecture.
Related Articles | Metrics