Cargando…

Learning Representations Using RNN Encoder-Decoder for Edge Security Control

Whitelisting is a widely used method in the security field. However, due to the rapid development of the Internet, the traditional whitelisting method cannot promote the security of increasing Internet access. In recent years, with the success of machine learning in different areas, many researchers...

Descripción completa

Detalles Bibliográficos
Autores principales: Guo, Wei, Chen, Hexiong, Hang, Feilu, He, Yingjun, Zhang, Jun
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9152390/
https://www.ncbi.nlm.nih.gov/pubmed/35655517
http://dx.doi.org/10.1155/2022/4199044
_version_ 1784717636284710912
author Guo, Wei
Chen, Hexiong
Hang, Feilu
He, Yingjun
Zhang, Jun
author_facet Guo, Wei
Chen, Hexiong
Hang, Feilu
He, Yingjun
Zhang, Jun
author_sort Guo, Wei
collection PubMed
description Whitelisting is a widely used method in the security field. However, due to the rapid development of the Internet, the traditional whitelisting method cannot promote the security of increasing Internet access. In recent years, with the success of machine learning in different areas, many researchers focus on the security of Internet access through machine learning methods. The most common form of machine learning is supervised learning. Supervised learning requires a large number of labeled samples, but it is difficult to obtain labeled samples in practical applications. This paper introduced an unsupervised deep learning algorithm based on seq2seq, which combined with the recurrent neural network and the autoencoder structure to realize an intelligent boundary security control mechanism. The main methods proposed in this paper are divided into two parts: data processing and modeling. In the phase of data processing, the access text table was coded with dicts, and all sequences were padded to the maximum. In the modeling phase, the network was optimized according to the principle of minimizing the reconstruction error. From the comparative experiments, the proposed method's AUC on the public data set reached 0.99, and its performance is better than several classical supervised learning algorithms, proving that the proposed method has an efficient defense against abnormal network access.
format Online
Article
Text
id pubmed-9152390
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-91523902022-06-01 Learning Representations Using RNN Encoder-Decoder for Edge Security Control Guo, Wei Chen, Hexiong Hang, Feilu He, Yingjun Zhang, Jun Comput Intell Neurosci Research Article Whitelisting is a widely used method in the security field. However, due to the rapid development of the Internet, the traditional whitelisting method cannot promote the security of increasing Internet access. In recent years, with the success of machine learning in different areas, many researchers focus on the security of Internet access through machine learning methods. The most common form of machine learning is supervised learning. Supervised learning requires a large number of labeled samples, but it is difficult to obtain labeled samples in practical applications. This paper introduced an unsupervised deep learning algorithm based on seq2seq, which combined with the recurrent neural network and the autoencoder structure to realize an intelligent boundary security control mechanism. The main methods proposed in this paper are divided into two parts: data processing and modeling. In the phase of data processing, the access text table was coded with dicts, and all sequences were padded to the maximum. In the modeling phase, the network was optimized according to the principle of minimizing the reconstruction error. From the comparative experiments, the proposed method's AUC on the public data set reached 0.99, and its performance is better than several classical supervised learning algorithms, proving that the proposed method has an efficient defense against abnormal network access. Hindawi 2022-05-23 /pmc/articles/PMC9152390/ /pubmed/35655517 http://dx.doi.org/10.1155/2022/4199044 Text en Copyright © 2022 Wei Guo et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Guo, Wei
Chen, Hexiong
Hang, Feilu
He, Yingjun
Zhang, Jun
Learning Representations Using RNN Encoder-Decoder for Edge Security Control
title Learning Representations Using RNN Encoder-Decoder for Edge Security Control
title_full Learning Representations Using RNN Encoder-Decoder for Edge Security Control
title_fullStr Learning Representations Using RNN Encoder-Decoder for Edge Security Control
title_full_unstemmed Learning Representations Using RNN Encoder-Decoder for Edge Security Control
title_short Learning Representations Using RNN Encoder-Decoder for Edge Security Control
title_sort learning representations using rnn encoder-decoder for edge security control
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9152390/
https://www.ncbi.nlm.nih.gov/pubmed/35655517
http://dx.doi.org/10.1155/2022/4199044
work_keys_str_mv AT guowei learningrepresentationsusingrnnencoderdecoderforedgesecuritycontrol
AT chenhexiong learningrepresentationsusingrnnencoderdecoderforedgesecuritycontrol
AT hangfeilu learningrepresentationsusingrnnencoderdecoderforedgesecuritycontrol
AT heyingjun learningrepresentationsusingrnnencoderdecoderforedgesecuritycontrol
AT zhangjun learningrepresentationsusingrnnencoderdecoderforedgesecuritycontrol