Cargando…
Learning Representations Using RNN Encoder-Decoder for Edge Security Control
Whitelisting is a widely used method in the security field. However, due to the rapid development of the Internet, the traditional whitelisting method cannot promote the security of increasing Internet access. In recent years, with the success of machine learning in different areas, many researchers...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9152390/ https://www.ncbi.nlm.nih.gov/pubmed/35655517 http://dx.doi.org/10.1155/2022/4199044 |
_version_ | 1784717636284710912 |
---|---|
author | Guo, Wei Chen, Hexiong Hang, Feilu He, Yingjun Zhang, Jun |
author_facet | Guo, Wei Chen, Hexiong Hang, Feilu He, Yingjun Zhang, Jun |
author_sort | Guo, Wei |
collection | PubMed |
description | Whitelisting is a widely used method in the security field. However, due to the rapid development of the Internet, the traditional whitelisting method cannot promote the security of increasing Internet access. In recent years, with the success of machine learning in different areas, many researchers focus on the security of Internet access through machine learning methods. The most common form of machine learning is supervised learning. Supervised learning requires a large number of labeled samples, but it is difficult to obtain labeled samples in practical applications. This paper introduced an unsupervised deep learning algorithm based on seq2seq, which combined with the recurrent neural network and the autoencoder structure to realize an intelligent boundary security control mechanism. The main methods proposed in this paper are divided into two parts: data processing and modeling. In the phase of data processing, the access text table was coded with dicts, and all sequences were padded to the maximum. In the modeling phase, the network was optimized according to the principle of minimizing the reconstruction error. From the comparative experiments, the proposed method's AUC on the public data set reached 0.99, and its performance is better than several classical supervised learning algorithms, proving that the proposed method has an efficient defense against abnormal network access. |
format | Online Article Text |
id | pubmed-9152390 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-91523902022-06-01 Learning Representations Using RNN Encoder-Decoder for Edge Security Control Guo, Wei Chen, Hexiong Hang, Feilu He, Yingjun Zhang, Jun Comput Intell Neurosci Research Article Whitelisting is a widely used method in the security field. However, due to the rapid development of the Internet, the traditional whitelisting method cannot promote the security of increasing Internet access. In recent years, with the success of machine learning in different areas, many researchers focus on the security of Internet access through machine learning methods. The most common form of machine learning is supervised learning. Supervised learning requires a large number of labeled samples, but it is difficult to obtain labeled samples in practical applications. This paper introduced an unsupervised deep learning algorithm based on seq2seq, which combined with the recurrent neural network and the autoencoder structure to realize an intelligent boundary security control mechanism. The main methods proposed in this paper are divided into two parts: data processing and modeling. In the phase of data processing, the access text table was coded with dicts, and all sequences were padded to the maximum. In the modeling phase, the network was optimized according to the principle of minimizing the reconstruction error. From the comparative experiments, the proposed method's AUC on the public data set reached 0.99, and its performance is better than several classical supervised learning algorithms, proving that the proposed method has an efficient defense against abnormal network access. Hindawi 2022-05-23 /pmc/articles/PMC9152390/ /pubmed/35655517 http://dx.doi.org/10.1155/2022/4199044 Text en Copyright © 2022 Wei Guo et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Guo, Wei Chen, Hexiong Hang, Feilu He, Yingjun Zhang, Jun Learning Representations Using RNN Encoder-Decoder for Edge Security Control |
title | Learning Representations Using RNN Encoder-Decoder for Edge Security Control |
title_full | Learning Representations Using RNN Encoder-Decoder for Edge Security Control |
title_fullStr | Learning Representations Using RNN Encoder-Decoder for Edge Security Control |
title_full_unstemmed | Learning Representations Using RNN Encoder-Decoder for Edge Security Control |
title_short | Learning Representations Using RNN Encoder-Decoder for Edge Security Control |
title_sort | learning representations using rnn encoder-decoder for edge security control |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9152390/ https://www.ncbi.nlm.nih.gov/pubmed/35655517 http://dx.doi.org/10.1155/2022/4199044 |
work_keys_str_mv | AT guowei learningrepresentationsusingrnnencoderdecoderforedgesecuritycontrol AT chenhexiong learningrepresentationsusingrnnencoderdecoderforedgesecuritycontrol AT hangfeilu learningrepresentationsusingrnnencoderdecoderforedgesecuritycontrol AT heyingjun learningrepresentationsusingrnnencoderdecoderforedgesecuritycontrol AT zhangjun learningrepresentationsusingrnnencoderdecoderforedgesecuritycontrol |