Vol. 4 No. 1 (2024): Issue 4
Articles

A Study on the Mamba-ECANet Model for Intrusion Detection in Data Security Using End-to-End Learning

Published 2024-11-10

How to Cite

Wang, M., Zhang, H., & Zhou, N. (2024). A Study on the Mamba-ECANet Model for Intrusion Detection in Data Security Using End-to-End Learning. Optimizations in Applied Machine Learning, 4(1). https://doi.org/10.71070/oaml.v1i1.8

Abstract

With the rapid advancement of information technology, network security has become an increasingly critical concern. In particular, data security intrusions pose significant risks to the privacy of data and the security of both enterprise and personal systems. Traditional intrusion detection systems often struggle with low detection accuracy and high false alarm rates, especially in complex and dynamic network environments with diverse attack techniques. To address these challenges, this paper proposes a deep learning-based data security intrusion detection system that integrates the Mamba model and the ECANet model, employing an end-to-end learning approach for training and optimization. First, the Mamba model is utilized for initial data feature extraction, offering efficient feature representation that lays a strong foundation for the detection process. Next, the ECANet model is incorporated to optimize feature selection using the attention mechanism, allowing the model to focus on the most critical features. Finally, the entire system is trained and optimized through an end-to-end learning approach, ensuring robust performance and reliability in real-world applications. Experimental results demonstrate that the proposed intrusion detection system achieves higher detection accuracy across various test datasets, with a 5% improvement over traditional methods, offering a novel and effective solution for data security.

References

  1. Aldhaheri, A., Alwahedi, F., Ferrag, M. A., and Battah, A. (2023). Deep learning for cyber threat detection in iot networks: A review. Internet of Things and Cyber-Physical Systems
  2. C ̧ avu s ̧ o ̆glu, ̈U. (2019). A new hybrid approach for intrusion detection using machine learning methods. Applied Intelligence 49, 2735–2761
  3. Chen, H., Li, C., Li, X., Rahaman, M. M., Hu, W., Li, Y., et al. (2022). Il-mcam: An interactive learning and multi-channel attention mechanism-based weakly supervised colorectal histopathology image classification approach. Computers in Biology and Medicine 143, 105265
  4. Dong, B. and Wang, X. (2016). Comparison deep learning method to traditional methods using for network intrusion detection. In 2016 8th IEEE international conference on communication software and networks (ICCSN) (IEEE), 581–585
  5. Gu, A. and Dao, T. (2023). Mamba: Linear-time sequence modeling with selective state spaces. arXiv preprint arXiv:2312.00752
  6. Han, K., Wang, Y., Chen, H., Chen, X., Guo, J., Liu, Z., et al. (2022). A survey on vision transformer. IEEE transactions on pattern analysis and machine intelligence 45, 87–110
  7. Huang, H., Tang, B., Luo, J., Pu, H., and Zhang, K. (2021). Residual gated dynamic sparse network for gearbox fault diagnosis using multisensor data. IEEE Transactions on Industrial Informatics 18, 2264–2273
  8. Huynh-The, T., Pham, Q.-V., Nguyen, T.-V., Da Costa, D. B., and Kim, D.-S. (2022). Rf-uavnet: High-performance convolutional network for rf-based drone surveillance systems. IEEE Access 10, 49696–49707
  9. Imrana, Y., Xiang, Y., Ali, L., and Abdul-Rauf, Z. (2021). A bidirectional lstm deep learning approach for intrusion detection. Expert Systems with Applications 185, 115524
  10. Jia, H., Sun, H., Wang, H., Wu, Y., and Wang, H. (2021). Scanning strategy in selective laser melting (slm): a review. The International Journal of Advanced Manufacturing Technology 113, 2413–2435
  11. Jiang, D., Zhang, P., Lv, Z., and Song, H. (2016). Energy-efficient multi-constraint routing algorithm with load balancing for smart city applications. IEEE Internet of Things Journal 3, 1437–1447
  12. Khraisat, A., Gondal, I., Vamplew, P., and Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2, 1–22
  13. Kim, J., Kim, J., Kim, H., Shim, M., and Choi, E. (2020). Cnn-based network intrusion detection against denial-of-service attacks. Electronics 9, 916
  14. Li, L., Lu, Y., Yang, G., and Yan, X. (2024). End-to-end network intrusion detection based on contrastive learning. Sensors 24, 2122
  15. Sarvari, S., Sani, N. F. M., Hanapi, Z. M., and Abdullah, M. T. (2020). An efficient anomaly intrusion detection method with feature selection and evolutionary neural network. IEEE Access 8, 70651–70663
  16. Shi, Y., Dong, M., and Xu, C. (2024). Multi-scale vmamba: Hierarchy in hierarchy visual state space model. arXiv preprint arXiv:2405.14174
  17. Tian, Q., Han, D., Li, K.-C., Liu, X., Duan, L., and Castiglione, A. (2020). An intrusion detection approach based on improved deep belief network. Applied Intelligence 50, 3162–3178
  18. Toorani, M. and Beheshti, A. (2008). Ssms-a secure sms messaging protocol for the m-payment systems. In 2008 IEEE Symposium on Computers and Communications (IEEE), 700–705
  19. Waleffe, R., Byeon, W., Riach, D., Norick, B., Korthikanti, V., Dao, T., et al. (2024). An empirical study of mamba-based language models. arXiv preprint arXiv:2406.07887
  20. Wang, Q., Wu, B., Zhu, P., Li, P., Zuo, W., and Hu, Q. (2020). Eca-net: Efficient channel attention for deep convolutional neural networks. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 11534–11542
  21. Xu, R., Yang, S., Wang, Y., Du, B., and Chen, H. (2024). A survey on vision mamba: Models, applications and challenges. arXiv preprint arXiv:2404.18861
  22. Yang, H. and Wang, F. (2019). Wireless network intrusion detection based on improved convolutional neural network. Ieee Access 7, 64366–64374
  23. Yin, W., Kann, K., Yu, M., and Sch ̈utze, H. (2017). Comparative study of cnn and rnn for natural language processing. arXiv preprint arXiv:1702.01923