Downloads

Minji Kim, & Joonho Park. (2024). End-to-End Intrusion Detection in Data Security Using Attention-Based Large Language Model. Innovations in Applied Engineering and Technology, 3(1), 1–16. https://doi.org/10.62836/iaet.v3i1.485

End-to-End Intrusion Detection in Data Security Using Attention-Based Large Language Model

The critical importance of cybersecurity escalates alongside the rapid progress in information technology, with data security intrusions posing severe threats to personal privacy and enterprise system integrity. Conventional intrusion detection systems, particularly challenged by complex, dynamic networks and diverse attack vectors, frequently exhibit insufficient detection accuracy coupled with elevated false alarm rates. Confronting these limitations, this paper introduces a deep learning-based data security intrusion detection system. This novel solution integrates the Mamba model for foundational feature extraction, establishing efficient data representations. Subsequently, the ECANet model refines feature selection via its attention mechanism, dynamically prioritizing the most critical features. The entire architecture undergoes end-to-end learning for holistic training and optimization, ensuring robust real-world applicability. Experimental validation confirms the system’s superior performance, consistently attaining a 5% higher detection accuracy across varied test datasets compared to traditional methods, thereby presenting an effective innovation for data security protection.

data security anomaly detection Mamba model ECANet model end-to-end learning feature extraction

References

  1. Kim J, Kim J, Kim H, et al. Cnn-Based Network Intrusion Detection against Denial-of-Service attacks. Electronics 2020; 9: 916.
  2. Imrana Y, Xiang Y, Ali L, et al. A Bidirectional Lstm Deep Learning Approach for Intrusion Detection. Expert Systems with Applications 2021; 185: 115524.
  3. Toorani, M. Beheshti, A. SSMS-A Secure SMS Messaging Protocol for the m-Payment Systems. In Proceedings of the 2008 IEEESymposium on Computers and Communications IEEE), Marrakech, Morocco, 6–9 July 2008.
  4. Waleffe R, Byeon W, Riach D, et al. An Empirical Study of Mamba-Based Language Models. arXiv 2024; arXiv:2406.07887.
  5. Shi Y, Dong M, Xu C. Multi-Scale Vmamba: Hierarchy in Hierarchy Visual State Space Model. arXiv 2024; arXiv:2405.14174.
  6. Jia H, Sun H, Wang H, et al. Scanning Strategy in Selective Laser Melting (SLM): A Review. The International Journal of Advanced Manufacturing Technology 2021; 113: 2413–2435.
  7. Han K, Wang Y, Chen H, et al. A Survey on Vision Transformer. IEEE Transactions on Pattern Analysis and Machine Intelligence 2022; 45: 87–110.
  8. Yin W, Kann K, Yu M, et al. Comparative Study of CNN and RNN for Natural Language Processing. arXiv 2017; arXiv:1702.01923.
  9. Khraisat A, Gondal I, Vamplew P, et al. Survey of Intrusion Detection Systems: Techniques, Datasets and Challenges. Cybersecurity 2019; 2: 1–22.
  10. Çavuşoğlu Ü. A New Hybrid Approach for Intrusion Detection Using Machine Learning Methods. Applied Intelligence 2019; 49: 2735–2761.
  11. Aldhaheri A, Alwahedi F, Ferrag MA, et al. Deep Learning for Cyber Threat Detection in Iot Networks: A Review. Internet of Things and Cyber-Physical Systems 2023; 4: 110–128.
  12. Li L, Lu Y, Yang G, et al. End-to-End Network Intrusion Detection Based on Contrastive Learning. Sensors 2024; 24: 2122.
  13. Yang H, Wang F. Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network. IEEE Access 2019; 7: 64366–64374.
  14. Jiang D, Zhang P, Lv Z, et al. Energy-Efficient Multi-Constraint Routing Algorithm with Load Balancing for Smart City Applications. IEEE Internet of Things Journal 2016; 3: 1437–1447.
  15. Dong B, Wang X. Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection. In Proceedings of the 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN) (IEEE), Beijing, China, 4–6 June 2016.
  16. Sarvari S, Sani NFM, Hanapi ZM, et al. An Efficient Anomaly Intrusion Detection Method with Feature Selection and Evolutionary Neural Network. IEEE Access 2020; 8: 70651–70663.
  17. Tian Q, Han D, Li K-C, et al. An Intrusion Detection Approach Based on Improved Deep Belief Network. Applied Intelligence 2020; 50: 3162–3178.
  18. Gu A, Dao T. Mamba: Linear-Time Sequence Modeling with Selective State Spaces. arXiv 2023; arXiv:2312.00752.
  19. Xu R, Yang S, Wang Y, et al. A Survey on Vision Mamba: Models, Applications and Challenges. arXiv 2024; arXiv:2404.18861.
  20. Wang Q, Wu B, Zhu P, et al. Eca-Net: Efficient Channel Attention for Deep Convolutional Neural Networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 13–19 June 2020.
  21. Huynh-The T, Pham Q-V, Nguyen T-V, et al. Rfuavnet: High-Performance Convolutional Network for Rf-Based Drone Surveillance Systems. IEEE Access 2022; 10: 49696–49707.
  22. Huang H, Tang B, Luo J, et al. Residual Gated Dynamic Sparse Network for Gearbox Fault Diagnosis Using Multisensor Data. IEEE Transactions on Industrial Informatics 2021; 18: 2264–2273.
  23. Chen H, Li C, Li X, et al. Il-Mcam: An Interactive Learning and Multi-Channel Attention Mechanism-Based Weakly Supervised Colorectal Histopathology Image Classification Approach. Computers in Biology and Medicine 2022; 143: 105265.
  24. Tang M, Ren P, Zhao Z. Bridging the Gap: The Role of Educational Technology in Promoting Educational Equity. The Educational Review, USA 2024; 8: 1077–1086.
  25. Zhu Q, Dan S. Data Security Identification Based on Full-Dimensional Dynamic Convolution and Multi-Modal CLIP. Journal of Information, Technology and Policy 2023; 1: 1–16.
  26. Luo Z, Yan H, Pan X. Optimizing Transformer Models for Resource-Constrained Environments: A Study on Model Compression Techniques. Journal of Computational Methods in Engineering Applications 2023; 3: 1–12. https://doi.org/10.62836/jcmea.v3i1.030107.
  27. Yan H, Shao D. Enhancing Transformer Training Efficiency with Dynamic Dropout. arXiv 2024; arXiv:2411.03236.
  28. Yan H. Real-Time 3D Model Reconstruction through Energy-Efficient Edge Computing. Optimizations in Applied Machine Learning 2022; 2.
  29. Zhu Q. An Innovative Approach for Distributed Cloud Computing through Dynamic Bayesian Networks. Journal of Computational Methods in Engineering Applications 2024; 4: 1–16.
  30. Zhao Z, Ren P, Yang Q. Student Self-Management, Academic Achievement: Exploring the Mediating Role of Self-Efficacy and the Moderating Influence of Gender Insights from a Survey Conducted in 3 Universities in America. arXiv 2024; arXiv:2404.11029.
  31. Zhao Z, Ren P, Tang M. Analyzing the Impact of Anti-Globalization on the Evolution of Higher Education Internationalization in China. Journal of Linguistics and Education Research 2022; 5: 15–31.
  32. Ren P, Zhao Z, Yang Q. Exploring the Path of Transformation and Development for Study Abroad Consultancy Firms in China. arXiv 2024; arXiv:2404.11034.
  33. Ren P, Zhao Z. Parental Recognition of Double Reduction Policy, Family Economic Status and Educational Anxiety: Exploring the Mediating Influence of Educational Technology Substitutive Resource. Economics & Management Information 2024; 3: 1–12.
  34. Zhao Z, Ren P, Tang M. How Social Media as a Digital Marketing Strategy Influences Chinese Students’ Decision to Study Abroad in the United States: A Model Analysis Approach. Journal of Linguistics and Education Research 2024; 6: 12–23.
  35. Zhang Y, Hart JD. The Effect of Prior Parameters in a Bayesian Approach to Inferring Material Properties from Experimental Measurements. Journal of Engineering Mechanics 2023; 149: 04023007. https://doi.org/10.1061/JENMDT.EMENG-6687.
  36. Zhang Y, Needleman A. On the Identification of Power-Law Creep Parameters from Conical Indentation. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 2021; 477: 20210233. https://doi.org/10.1098/rspa.2021.0233.

Supporting Agencies

  1. Funding: Not applicable.