JOURNAL ARTICLE

Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism

Ping ZhaoZhijie FanZhiwei CaoXin Li

Year: 2021 Journal:   International Journal of Information Security and Privacy Vol: 16 (1)Pages: 1-20   Publisher: Taylor & Francis

Abstract

In order to improve the ability to detect network attacks, traditional intrusion detection models often used convolutional neural networks to encode spatial information or recurrent neural networks to obtain temporal features of the data. Some models combined the two methods to extract spatio-temporal features. However, these approaches used separate models and learned features insufficiently. This paper presented an improved model based on temporal convolutional networks (TCN) and attention mechanism. The causal and dilation convolution can capture the spatio-temporal dependencies of the data. The residual blocks allow the network to transfer information in a cross-layered manner, enabling in-depth network learning. Meanwhile, attention mechanism can enhance the model's attention to the relevant anomalous features of different attacks. Finally, this paper compared models results on the KDD CUP99 and UNSW-NB15 datasets. Besides, the authors apply the model to video surveillance network attack detection scenarios. The result shows that the model has advantages in evaluation metrics.

Keywords:
Computer science Convolutional neural network Residual Artificial intelligence Convolution (computer science) Intrusion detection system Data mining ENCODE Transfer of learning Mechanism (biology) Machine learning Pattern recognition (psychology) Artificial neural network Algorithm

Metrics

23
Cited By
2.82
FWCI (Field Weighted Citation Impact)
29
Refs
0.90
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
© 2026 ScienceGate Book Chapters — All rights reserved.