{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:10:16Z","timestamp":1758845416056,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T00:00:00Z","timestamp":1607990400000},"content-version":"vor","delay-in-days":14,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2019YJS049"],"award-info":[{"award-number":["2019YJS049"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecur"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models. However, the classic augmentation methods cannot be applied to those DL models which exploit the system-call sequences to detect intrusion. Previously, the seq2seq model has been explored to augment system-call sequences. Following this work, we propose a gated convolutional neural network (GCNN) model to thoroughly extract the potential information of augmented sequences. Also, in order to enhance the model\u2019s robustness, we adopt adversarial training to reduce the impact of adversarial examples on the model. Adversarial examples used in adversarial training are generated by the proposed adversarial sequence generation algorithm. The experimental results on different verified models show that GCNN model can better obtain the potential information of the augmented data and achieve the best performance. Furthermore, GCNN with adversarial training can enhance robustness significantly.<\/jats:p>","DOI":"10.1186\/s42400-020-00063-5","type":"journal-article","created":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T00:05:56Z","timestamp":1607990756000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection"],"prefix":"10.1186","volume":"3","author":[{"given":"Yixiang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shaohua","family":"lv","sequence":"additional","affiliation":[]},{"given":"Jiqiang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2975-8857","authenticated-orcid":false,"given":"Xiaolin","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Jinqiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,15]]},"reference":[{"key":"63_CR1","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar, N, Mian A (2018) Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access 6:14410\u201314430.","journal-title":"IEEE Access"},{"key":"63_CR2","doi-asserted-by":"publisher","first-page":"52843","DOI":"10.1109\/ACCESS.2018.2869577","volume":"6","author":"M Al-Qatf","year":"2018","unstructured":"Al-Qatf, M, Lasheng Y, Al-Habib M, Al-Sabahi K (2018) Deep learning approach combining sparse autoencoder with svm for network intrusion detection. IEEE Access 6:52843\u201352856.","journal-title":"IEEE Access"},{"key":"63_CR3","unstructured":"Bahdanau, D, Cho K, Bengio Y (2015) Neural Machine Translation by Jointly Learning to Align and Translate. cite arxiv:1409.0473Comment: Accepted at ICLR 2015 as oral presentation. https:\/\/nyuscholars.nyu.edu\/en\/publications\/neural-machine-translation-by-jointly-learning-to-align-and-trans-2."},{"key":"63_CR4","doi-asserted-by":"crossref","unstructured":"Cho, K, Van Merri\u00ebnboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using rnn encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078:1724\u20131734. https:\/\/www.aclweb.org\/anthology\/D14-1179.bib.","DOI":"10.3115\/v1\/D14-1179"},{"key":"63_CR5","volume-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"J Chung","year":"2014","unstructured":"Chung, J, Gulcehre C, Cho K, Bengio Y (2014) Empirical evaluation of gated recurrent neural networks on sequence modeling. ACM, Montreal. https:\/\/nyuscholars.nyu.edu\/en\/publications\/empirical-evaluation-of-gated-recurrent-neural-networks-on-sequen."},{"issue":"3","key":"63_CR6","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297.","journal-title":"Mach Learn"},{"key":"63_CR7","doi-asserted-by":"publisher","first-page":"4487","DOI":"10.1109\/WCNC.2013.6555301","volume-title":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","author":"G Creech","year":"2013","unstructured":"Creech, G, Hu J (2013) Generation of a new ids test dataset: Time to retire the kdd collection In: 2013 IEEE Wireless Communications and Networking Conference (WCNC), 4487\u20134492.. IEEE, Shanghai. https:\/\/ieeexplore.ieee.org\/document\/6555301."},{"key":"63_CR8","unstructured":"Devlin, J, Chang M-W, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805:4171\u20134186. https:\/\/www.aclweb.org\/anthology\/N19-1423.bib."},{"issue":"2","key":"63_CR9","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1207\/s15516709cog1402_1","volume":"14","author":"J Elman","year":"1990","unstructured":"Elman, J (1990) Finding structure in time. Cogn Sci 14(2):179\u2013211.","journal-title":"Cogn Sci"},{"issue":"8","key":"63_CR10","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T (2006) An introduction to roc analysis. Pattern Recogn Lett 27(8):861\u2013874.","journal-title":"Pattern Recogn Lett"},{"key":"63_CR11","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/ACSAC.2008.54","volume-title":"2008 Annual Computer Security Applications Conference (ACSAC)","author":"S Forrest","year":"2008","unstructured":"Forrest, S, Hofmeyr S, Somayaji A (2008) The evolution of system-call monitoring In: 2008 Annual Computer Security Applications Conference (ACSAC), 418\u2013430.. IEEE, Anaheim. https:\/\/ieeexplore.ieee.org\/document\/4721577."},{"key":"63_CR12","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/CBD.2014.41","volume-title":"2014 Second International Conference on Advanced Cloud and Big Data","author":"N Gao","year":"2014","unstructured":"Gao, N, Gao L, Gao Q, Wang H (2014) An intrusion detection model based on deep belief networks In: 2014 Second International Conference on Advanced Cloud and Big Data, 247\u2013252.. IEEE, Huangshan. https:\/\/ieeexplore.ieee.org\/document\/7176101."},{"key":"63_CR13","unstructured":"Goodfellow, IJ, Shlens J, Szegedy C (2015) Explaining and Harnessing Adversarial Examples."},{"key":"63_CR14","doi-asserted-by":"crossref","unstructured":"Hao, S, Long J, Yang Y (2019) Bl-ids: Detecting web attacks using bi-lstm model based on deep learning In: International Conference on Security and Privacy in New Computing Environments, 551\u2013563.. Springer.","DOI":"10.1007\/978-3-030-21373-2_45"},{"issue":"8","key":"63_CR15","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780.","journal-title":"Neural Comput"},{"key":"63_CR16","first-page":"278282","volume-title":"Proceedings of the 3rd International Conference on Document Analysis and Recognition, vol. 1416","author":"H Kam","year":"1995","unstructured":"Kam, H (1995) Random decision forest In: Proceedings of the 3rd International Conference on Document Analysis and Recognition, vol. 1416, 278282.. IEEE, Montreal, Canada, August."},{"key":"63_CR17","first-page":"4401","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"T Karras","year":"2019","unstructured":"Karras, T, Laine S, Aila T (2019) A style-based generator architecture for generative adversarial networks In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 4401\u20134410.. IEEE, Long Beach. https:\/\/ieeexplore.ieee.org\/abstract\/document\/8953766."},{"key":"63_CR18","first-page":"357","volume-title":"International Workshop on Information Security Applications","author":"J Kim","year":"2015","unstructured":"Kim, J, Kim H (2015) Applying recurrent neural network to intrusion detection with hessian free optimization In: International Workshop on Information Security Applications, 357\u2013369.. Springer, Jeju Island. https:\/\/link.springer.com\/book\/10.1007\/978-3-319-31875-2."},{"key":"63_CR19","first-page":"1","volume-title":"2016 International Conference on Platform Technology and Service (PlatCon)","author":"J Kim","year":"2016","unstructured":"Kim, J, Kim J, Thu H, Kim H (2016) Long short term memory recurrent neural network classifier for intrusion detection In: 2016 International Conference on Platform Technology and Service (PlatCon), 1\u20135.. IEEE, Jeju. https:\/\/ieeexplore.ieee.org\/document\/7456805."},{"key":"63_CR20","unstructured":"Kobayashi, S (2018) Contextual augmentation: Data augmentation by words with paradigmatic relations. arXiv preprint arXiv:1805.06201:452\u2013457. https:\/\/www.aclweb.org\/anthology\/N18-2072.bib."},{"key":"63_CR21","unstructured":"Kusner, M, Hern\u00e1ndez-Lobato J (2016) Gans for sequences of discrete elements with the gumbel-softmax distribution. arXiv preprint arXiv:1611.04051."},{"key":"63_CR22","unstructured":"Lan, Z, Chen M, Goodman S, Gimpel K, Sharma P, Soricut R (2019) Albert: A lite bert for self-supervised learning of language representations. arXiv preprint arXiv:1909.11942."},{"issue":"4","key":"63_CR23","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1162\/neco.1989.1.4.541","volume":"1","author":"Y LeCun","year":"1989","unstructured":"LeCun, Y, Boser B, Denker J, Henderson D, Howard R, Hubbard W, Jackel L (1989) Backpropagation applied to handwritten zip code recognition. Neural Comput 1(4):541\u2013551.","journal-title":"Neural Comput"},{"issue":"11","key":"63_CR24","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324.","journal-title":"Proc IEEE"},{"key":"63_CR25","unstructured":"Liu, Y, Liu S, Zhao X (2017) Intrusion detection algorithm based on convolutional neural network. DEStech Trans Eng Technol Res (iceta):62\u201367. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3313991.3314009."},{"key":"63_CR26","doi-asserted-by":"publisher","first-page":"71413","DOI":"10.1109\/ACCESS.2018.2881561","volume":"6","author":"S Lv","year":"2018","unstructured":"Lv, S, Wang J, Yang Y, Liu J (2018) Intrusion prediction with system-call sequence-to-sequence model. IEEE Access 6:71413\u201371421.","journal-title":"IEEE Access"},{"key":"63_CR27","doi-asserted-by":"crossref","unstructured":"Mikolov, T, Karafiat M, Burget L, Cernock\u00fd J, Khudanpur S (2010) Recurrent neural network based language model. Twelfth Annu Conf Int Speech Commun Assoc:1045\u20131048.","DOI":"10.21437\/Interspeech.2010-343"},{"key":"63_CR28","first-page":"807","volume-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)","author":"V Nair","year":"2010","unstructured":"Nair, V, Hinton G (2010) Rectified linear units improve restricted boltzmann machines In: Proceedings of the 27th International Conference on Machine Learning (ICML-10), 807\u2013814.. ACM, Madison. https:\/\/dl.acm.org\/doi\/10.5555\/3104322.3104425."},{"key":"63_CR29","unstructured":"Powers, D (2011) Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation. https:\/\/dl.acm.org\/doi\/10.1145\/1143844.1143874."},{"key":"63_CR30","doi-asserted-by":"crossref","unstructured":"Rosenberg, I, Shabtai A, Rokach L, Elovici Y (2018) Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers. arXiv 1707.05970.","DOI":"10.1007\/978-3-030-00470-5_23"},{"issue":"1","key":"63_CR31","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1186\/s40537-019-0197-0","volume":"6","author":"C Shorten","year":"2019","unstructured":"Shorten, C, Khoshgoftaar T (2019) A survey on image data augmentation for deep learning. J Big Data 6(1):60.","journal-title":"J Big Data"},{"key":"63_CR32","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/SMARTCOMP.2019.00031","volume-title":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","author":"A Singla","year":"2019","unstructured":"Singla, A, Bertino E, Verma D (2019) Overcoming the lack of labeled data: Training intrusion detection models using transfer learning In: 2019 IEEE International Conference on Smart Computing (SMARTCOMP), 69\u201374.. IEEE, Washington. https:\/\/ieeexplore.ieee.org\/document\/8783997."},{"issue":"1","key":"63_CR33","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/S0034-4257(97)00083-7","volume":"62","author":"S Stehman","year":"1997","unstructured":"Stehman, S (1997) Selecting and interpreting measures of thematic classification accuracy. Remote Sens Environ 62(1):77\u201389.","journal-title":"Remote Sens Environ"},{"key":"63_CR34","first-page":"3104","volume-title":"Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2 NIPS\u201914","author":"I Sutskever","year":"2014","unstructured":"Sutskever, I, Vinyals O, Le Q (2014) Sequence to sequence learning with neural networks In: Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2 NIPS\u201914, 3104\u20133112.. MIT Press, Cambridge, MA, USA."},{"key":"63_CR35","unstructured":"Szegedy, C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2014) Intriguing properties of neural networks."},{"key":"63_CR36","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/IBIGDELFT.2018.8625318","volume-title":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","author":"S Ustebay","year":"2018","unstructured":"Ustebay, S, Turgut Z, Aydin M (2018) Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 71\u201376.. IEEE, Ankara. https:\/\/ieeexplore.ieee.org\/document\/8625318\/."},{"key":"63_CR37","first-page":"6629","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"X Wang","year":"2019","unstructured":"Wang, X, Huang Q, Celikyilmaz A, Gao J, Shen D, Wang Y-F, Wang W, Zhang L (2019) Reinforced cross-modal matching and self-supervised imitation learning for vision-language navigation In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 6629\u20136638.. IEEE, Long Beach. https:\/\/ieeexplore.ieee.org\/abstract\/document\/8953608."},{"key":"63_CR38","unstructured":"Wei, J, Zou K (2019) Eda: Easy data augmentation techniques for boosting performance on text classification tasks. arXiv preprint arXiv:1901.11196:6382\u20136388. https:\/\/www.aclweb.org\/anthology\/D19-1670.bib."},{"key":"63_CR39","doi-asserted-by":"publisher","first-page":"48697","DOI":"10.1109\/ACCESS.2018.2867564","volume":"6","author":"C Xu","year":"2018","unstructured":"Xu, C, Shen J, Du X, Zhang F (2018) An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 6:48697\u201348707.","journal-title":"IEEE Access"},{"key":"63_CR40","volume-title":"Thirty-First AAAI Conference on Artificial Intelligence","author":"L Yu","year":"2019","unstructured":"Yu, L, Zhang W, Wang J, Yu Y (2019) Seqgan: Sequence generative adversarial nets with policy gradient In: Thirty-First AAAI Conference on Artificial Intelligence.. ACM, San Francisco. https:\/\/dl.acm.org\/doi\/10.5555\/3298483.3298649."}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-020-00063-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s42400-020-00063-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-020-00063-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T23:09:27Z","timestamp":1670195367000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-020-00063-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["63"],"URL":"https:\/\/doi.org\/10.1186\/s42400-020-00063-5","relation":{},"ISSN":["2523-3246"],"issn-type":[{"type":"electronic","value":"2523-3246"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"20 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"No potential conflict of interest was reported by the authors.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"23"}}