Downloads

Zhang, H., Zhu, D., Gan, Y., & Xiong, S. . (2024). End-to-End Learning-Based Study on the Mamba-ECANet Model for Data Security Intrusion Detection. Journal of Information, Technology and Policy, 1–17. https://doi.org/10.62836/jitp.v1i1.219

End-to-End Learning-Based Study on the Mamba-ECANet Model for Data Security Intrusion Detection

With the rapid development of information technology, network security issues have become increasingly prominent. In particular, data security intrusions pose serious threats to the data privacy and system security of enterprises and individuals. Traditional intrusion detection systems often exhibit low detection accuracy and high false alarm rates when faced with complex and dynamic network environments and diverse attack methods. Therefore, this paper proposes a data security intrusion detection system based on deep learning, which integrates the Mamba model and ECANet model and employs an end-to-end learning approach for training and optimization. First, the Mamba model is introduced for preliminary data feature extraction, whose efficient feature representation capabilities provide a solid foundation for the subsequent detection process. Then, by integrating the ECANet model, feature selection is further optimized through the attention mechanism, enhancing the model’s focus on important features. Finally, an end-to-end learning approach is adopted to train and optimize the entire system, ensuring excellent performance and robustness in practical applications. Experimental results show that the proposed intrusion detection system demonstrates higher detection accuracy on multiple test datasets, improving by approximately 5% compared to traditional methods, providing a new and effective solution for data security.

data security; anomaly detection; Mamba model; ECANet model; end-to-end learning; feature extraction

References

  1. Kim J, Kim J, Kim H, Shim M, Choi E. CNN-Based Network Intrusion Detection against Denial-of-Service Attacks. Electronics 2020; 9(6): 916.
  2. Imrana Y, Xiang Y, Ali L, Abdul-Rauf Z. A Bidirectional LSTM Deep Learning Approach for Intrusion Detection. Expert Systems with Applications 2021; 185: 115524.
  3. Ye M, Zhou H, Yang H, Hu B, Wang X. Multi-Strategy Improved Dung Beetle Optimization Algorithm and Its Applications. Biomimetics 2024; 9(5): 291.
  4. Li S, Kou P, Ma M, Yang H, Huang S, Yang Z. Application of Semi-Supervised Learning in Image Classification: Research on Fusion of Labeled and Unlabeled Data. IEEE Access 2024; 12: 27331–27343.
  5. Qiu Y. Estimation of Tail Risk Measures in Finance: Approaches to Extreme Value Mixture Modeling. arXiv 2024, arXiv:240705933.
  6. Qiu Y, Wang J. A Machine Learning Approach to Credit Card Customer Segmentation for Economic Stability. In Proceedings of the 4th International Conference on Economic Management and Big Data Applications, ICEMBDA 2023, Tianjin, China, 27–29 October 2023.
  7. Chen Z, Fu C, Tang X. Multi-Domain Fake News Detection with Fuzzy Labels; International Conference on Database Systems for Advanced Applications; Springer: Berlin/Heidelberg, Germany, 2023.
  8. Toorani M, Beheshti A. SSMS-A Secure SMS Messaging Protocol for the m-Payment Systems. In Proceedings of the 2008 IEEE Symposium on Computers and Communications, Marrakech, Morocco, 6–9 July 2008.
  9. Waleffe R, Byeon W, Riach D, Norick B, Korthikanti V, Dao T, et al. An Empirical Study of Mamba-Based Language Models. arXiv 2024, arXiv:240607887.
  10. Shi Y, Dong M, Xu C. Multi-Scale VMamba: Hierarchy in Hierarchy Visual State Space Model. arXiv 2024, arXiv:240514174.
  11. Jia H, Sun H, Wang H, Wu Y, Wang H. Scanning Strategy in Selective Laser Melting (SLM): A Review. The International Journal of Advanced Manufacturing Technology 2021; 113: 2413–2435.
  12. Han K, Wang Y, Chen H, Chen X, Guo J, Liu Z, et al. A Survey on Vision Transformer. IEEE Transactions on Pattern Analysis and Machine Intelligence 2022; 45(1): 87–110.
  13. Yin W, Kann K, Yu M, Schütze H. Comparative Study of CNN and RNN for Natural Language Processing. arXiv 2017, arXiv:170201923.
  14. Li B, Ma Y, Liu Y, Gu H, Chen Z, Huang X. Federated Learning on Distributed Graphs Considering Multiple Heterogeneities. In Proceedings of the ICASSP 2024–2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Seoul, Korea, 14–19 April 2024.
  15. Zhao F, Yu F. Enhancing Multi-Class News Classification through Bert-Augmented Prompt Engineering in Large Language Models: A Novel Approach. In Proceedings of the 10th International Scientific and Practical Conference “Problems and Prospects of Modern Science and Education, Stockholm, Sweden, 12–15March 2024.
  16. Xu H, Shi C, Fan W, Chen Z. Improving Diversity and Discriminability Based Implicit Contrastive Learning for Unsupervised Domain Adaptation. Applied Intelligence 2024; 54(20): 10007–10017.
  17. Xiong S, Zhang H, Wang M. Ensemble Model of Attention Mechanism-Based DCGAN and Autoencoder for Noised OCR Classification. Journal of Electronic & Information Systems 2022; 4(1): 33–41.
  18. Chen Z, Fu C, Wu R, Wang Y, Tang X, Liang X. LGFat-RGCN: Faster Attention with Heterogeneous RGCN for Medical ICD Coding Generation. In Proceedings of the 31st ACM International Conference on Multimedia, Ottawa, ON, Canada, 29 October–3 November 2023.
  19. Xiong S, Zhang H. A Multi-Model Fusion Strategy for Android Malware Detection Based on Machine Learning Algorithms. Journal of Computer Science Research 2024; 6(2): 1–11.
  20. Xiong S, Chen X, Zhang H, Wang M. Domain Adaptation-Based Deep Learning Framework for Android Malware Detection Across Diverse Distributions. Artificial Intelligence Advances 2024; 6(1): 13–24.
  21. Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of Intrusion Detection Systems: Techniques, Datasets and Challenges. Cybersecurity 2019; 2(1): 1–22.
  22. Wang X, Zhao Y, Wang Z, Hu N. An Ultrafast and Robust Structural Damage Identification Framework Enabled by an Optimized Extreme Learning Machine. Mechanical Systems and Signal Processing 2024; 216: 111509.
  23. Zhu Y, Zhao Y, Song C, Wang Z. Evolving Reliability Assessment of Systems Using Active Learning-Based Surrogate Modelling. Physica D: Nonlinear Phenomena 2024; 457: 133957.
  24. Çavuşoğlu Ü. A New Hybrid Approach for Intrusion Detection Using Machine Learning Methods. Applied Intelligence 2019; 49: 2735–2761.
  25. Aldhaheri A, Alwahedi F, Ferrag MA, Battah A. Deep Learning for Cyber Threat Detection in IoT Networks: A Review. Internet of Things and Cyber-Physical Systems. 2023; 4: 110–128.
  26. Li L, Lu Y, Yang G, Yan X. End-to-End Network Intrusion Detection Based on Contrastive Learning. Sensors 2024; 24(7): 2122.
  27. Yang H, Wang F. Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network. IEEE Access 2019; 7: 64366–64374.
  28. Zhao F, Yu F, Trull T, Shang Y. A New Method Using LLMs for Keypoints Generation in Qualitative Data Analysis. In Proceedings of the 2023 IEEE Conference on Artificial Intelligence (CAI), Santa Clara, CA, USA, 5–6 June 2023.
  29. Jiang D, Zhang P, Lv Z, Song H. Energy-Efficient Multi-Constraint Routing Algorithm with Load Balancing for Smart City Applications. IEEE Internet of Things Journal 2016; 3(6): 1437–1447.
  30. Hao Y, Chen Z, Jin J, Sun X. Joint Operation Planning of Drivers and Trucks for Semi-Autonomous Truck Platooning. Transportmetrica A: Transport Science 2023: 10; 1–37.
  31. Hao Y, Chen Z, Sun X, Tong L. Planning of Truck Platooning for Road-Network Capacitated Vehicle Routing Problem. arXiv 2024, arXiv:240413512.
  32. Dong B, Wang X. Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection. In Proceedings of the 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN), Beijing, China, 4–6 June 2016.
  33. Li L, Li Z, Guo F, Yang H, Wei J, Yang Z. Prototype Comparison Convolutional Networks for One-Shot Segmentation. IEEE Access 2024; 12: 54978–54990.
  34. Sarvari S, Sani NFM, Hanapi ZM, Abdullah MT. An Efficient Anomaly Intrusion Detection Method with Feature Selection and Evolutionary Neural Network. IEEE Access 2020; 8: 70651–70663.
  35. Tian Q, Han D, Li K-C, Liu X, Duan L, Castiglione A. An Intrusion Detection Approach Based on Improved Deep Belief network. Applied Intelligence 2020; 50: 3162–3178.
  36. Wang M, Zhang H, Zhou N. Star Map Recognition and Matching Based on Deep Triangle Model. Journal of Information Technology and Policy 2024; 2024: 1–18.
  37. Gu A, Dao T. Mamba: Linear-Time Sequence Modeling with Selective State Spaces. arXiv 2023, arXiv:231200752.
  38. Xu R, Yang S, Wang Y, Du B, Chen H. A Survey on Vision Mamba: Models, Applications and Challenges. arXiv 2024, arXiv:240418861.
  39. Wang Q, Wu B, Zhu P, Li P, Zuo W, Hu Q. ECA-Net: Efficient Channel Attention for Deep Convolutional Neural Networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 19 June 2020.
  40. Huynh-The T, Pham Q-V, Nguyen T-V, Da Costa DB, Kim D-S. RF-UAVNet: High-Performance Convolutional Network for RF-Based Drone Surveillance Systems. IEEE Access 2022; 10: 49696–49707.
  41. Huang H, Tang B, Luo J, Pu H, Zhang K. Residual Gated Dynamic Sparse Network for Gearbox Fault Diagnosis Using Multisensor Data. IEEE Transactions on Industrial Informatics 2021; 18(4): 2264–2273.
  42. Chen H, Li C, Li X, Rahaman MM, Hu W, Li Y, et al. IL-MCAM: An Interactive Learning and Multi-Channel Attention Mechanism-Based Weakly Supervised Colorectal Histopathology Image Classification Approach. Computers in Biology and Medicine 2022; 143: 105265.

Supporting Agencies

  1. Funding: Not applicable.