JOURNAL ARTICLE

A Network Intrusion Detection Model Based on BiLSTM with Multi-Head Attention Mechanism

Jingqi ZhangXin ZhangZhaojun LiuFa FuYihan JiaoFei Xu

Year: 2023 Journal:   Electronics Vol: 12 (19)Pages: 4170-4170   Publisher: Multidisciplinary Digital Publishing Institute

Abstract

A network intrusion detection tool can identify and detect potential malicious activities or attacks by monitoring network traffic and system logs. The data within intrusion detection networks possesses characteristics that include a high degree of feature dimension and an unbalanced distribution across categories. Currently, the actual detection accuracy of some detection models is relatively low. To solve these problems, we propose a network intrusion detection model based on multi-head attention and BiLSTM (Bidirectional Long Short-Term Memory), which can introduce different attention weights for each vector in the feature vector that strengthen the relationship between some vectors and the detection attack type. The model also utilizes the advantage that BiLSTM can capture long-distance dependency relationships to obtain a higher detection accuracy. This model combined the advantages of the two models, adding a dropout layer between the two models to improve the detection accuracy while preventing training overfitting. Through experimental analysis, the network intrusion detection model that utilizes multi-head attention and BilSTM achieved an accuracy of 98.29%, 95.19%, and 99.08% on the KDDCUP99, NSLKDD, and CICIDS2017 datasets, respectively.

Keywords:
Overfitting Intrusion detection system Computer science Data mining Dependency (UML) Artificial intelligence Dropout (neural networks) Feature (linguistics) Support vector machine Pattern recognition (psychology) Machine learning Artificial neural network

Metrics

44
Cited By
19.34
FWCI (Field Weighted Citation Impact)
34
Refs
0.98
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Network Intrusion Detection Method Based on CNN-BiLSTM-Attention Model

Wei DaiXinhui LiWenxin JiSicheng He

Journal:   IEEE Access Year: 2024 Vol: 12 Pages: 53099-53111
JOURNAL ARTICLE

One Dimensional Conv-BiLSTM Network with Attention Mechanism for IoT Intrusion Detection

Bauyrzһan OmarovZhuldyz SailaukyzyAlfiya BigaliyevaAdilzhan KereyevLyazat NaizabayevaAigul Dautbayeva

Journal:   Computers, materials & continua/Computers, materials & continua (Print) Year: 2023 Vol: 77 (3)Pages: 3765-3781
JOURNAL ARTICLE

Depression detection using BiLSTM multi-head attention fusion network

Xiaobo ZhangXue GongWei LiGuoqing LiuYang Li

Journal:   Expert Systems with Applications Year: 2025 Vol: 299 Pages: 130100-130100
JOURNAL ARTICLE

A Dual-Attention CNN-BiLSTM Model for Network Intrusion Detection

Zheng ZhangJie HaoLiquan ChenTianhao HouYanan Liu

Journal:   Computers, materials & continua/Computers, materials & continua (Print) Year: 2025 Vol: 86 (1)Pages: 1-22
© 2026 ScienceGate Book Chapters — All rights reserved.