基于CPO-BiLSTM-KAN的网络恶意流量检测方法研究
DOI:
CSTR:
作者:
作者单位:

华北理工大学理学院 唐山 063210

作者简介:

通讯作者:

中图分类号:

TP393;TN918.4

基金项目:

河北省网络信息安全及风险防范综合治理研究(20230203095)项目资助


Research on the detection method of network malicious traffic based on CPO-BiLSTM-KAN
Author:
Affiliation:

College of Science, North China University of Science and Technology, Tangshan 063210, China

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    随着网络攻击手段的多样化和流量特征的复杂化,网络恶意流量的检测面临着越来越严峻的挑战。传统的流量检测方法在准确性和可靠性方面逐渐无法满足现代网络环境的需求,尤其是在高维数据和复杂攻击模式的情况下。为解决上述问题,本文提出了一种基于冠豪猪优化算法、双向长短期记忆网络和Kolmogorov-Arnold网络的网络恶意流量检测模型。该模型利用双向长短期记忆网络捕捉流量数据的双向时序特征,结合Kolmogorov-Arnold网络的非线性映射增强特征表达能力,并通过冠豪猪优化算法优化超参数提升模型性能。采用CIC UNSW-NB15增强数据集进行实验,实验结果表明,模型在二分类和多分类任务中准确率分别达到99.12%和94.15%,显著优于其他模型。此外,模型在应对类别不均衡时,特别增强了对Backdoor和Worms等少数类样本的检测能力。

    Abstract:

    With the diversification of network attack means and the complication of traffic characteristics, the detection of network malicious traffic is facing increasingly severe challenges. Traditional traffic detection methods gradually fail to meet the needs of modern network environments in terms of accuracy and reliability, especially in the case of high-dimensional data and complex attack patterns. To address the above issues, this paper proposes a network malicious traffic detection model based on the Crested Porcupine Optimization Algorithm, Bidirectional Long Short-Term Memory Network, and Kolmogorov-Arnold Network. The model uses the Bidirectional Long Short-Term Memory Network to capture the bidirectional temporal features of traffic data, combines the nonlinear mapping of the Kolmogorov-Arnold Network to enhance feature expression capabilities, and optimizes hyperparameters through the Crested Porcupine Optimization Algorithm to improve model performance. Experiments are conducted using the CIC UNSW-NB15 enhanced dataset. The experimental results show that the model achieves accuracies of 99.12% and 94.15% in binary classification and multi-classification tasks, respectively, significantly outperforming other models. In addition, when dealing with class imbalance, the model particularly enhances the detection capability for minority class samples such as Backdoor and Worms.

    参考文献
    相似文献
    引证文献
引用本文

刘凤春,王子贺,杨爱民,袁书娟,孔闪闪.基于CPO-BiLSTM-KAN的网络恶意流量检测方法研究[J].电子测量技术,2026,49(1):70-79

复制
分享
相关视频

文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:
  • 最后修改日期:
  • 录用日期:
  • 在线发布日期: 2026-02-11
  • 出版日期:
文章二维码

重要通知公告

①《电子测量技术》期刊收款账户变更公告
×
《电子测量技术》
关于防范虚假编辑部邮件的郑重公告