ORIGINAL RESEARCH article
Front. Commun. Netw.
Sec. IoT and Sensor Networks
Volume 6 - 2025 | doi: 10.3389/frcmn.2025.1546936
Abnormal traffic detection based on image recognition and attention-residual optimization
Provisionally accepted- 1Hubei Minzu University, Enshi, China
- 2Sichuan University, Chengdu, Sichuan Province, China
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
With the advancement of Internet of Things (IoT) technology, the continuous growth of IoT systems has resulted in the accumulation of massive amounts of data. Consequently, there has been a sharp increase in network attacks, highlighting the need for enhanced network security methods. Network intrusion detection systems play a crucial role in network security.Compared to the traditional approach of using single time-series models to process traffic data, this study innovatively proposes an RMCLA(Residual Network and Multi-scale Convolution Long Short-Term Memory with Attension Mechanisms) network intrusion detection system optimized with attention and residual mechanisms. This model converts traffic data into traffic feature images and enhances the feature contrast through histogram equalization. It then utilizes the powerful performance of convolutional networks to extract abnormal feature points. The attention module and residual network enhance the focus on abnormal points, reducing feature loss and redundancy, thereby achieving effective classification of traffic image processing. We conducted experiments on the CIC-IDS2017 and UNSW-NB15 datasets and compared our model with the latest research models.
Keywords: Intrusion detection system, deep learning, Convolutional Neural Network, image processing, long-short termmemory, attention mechanism, multiclass classification accuracy
Received: 22 Jan 2025; Accepted: 22 Apr 2025.
Copyright: © 2025 Chen, Shen, Xu, Liang and Du. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence:
Xinpeng Chen, Hubei Minzu University, Enshi, China
Jinan Shen, Hubei Minzu University, Enshi, China
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.