Research on SRv6 Network Traffic Anomaly Detection Based on ResNet18[J/OL]. Telecommunications Science, 2026.
DOI:
Research on SRv6 Network Traffic Anomaly Detection Based on ResNet18[J/OL]. Telecommunications Science, 2026. DOI: 10.11959/j.issn.1000-0801.DXKX260009.
Research on SRv6 Network Traffic Anomaly Detection Based on ResNet18
With the widespread deployment of Segment Routing over IPv6 (SRv6) in next-generation networks
its programmability and flexibility have significantly improved network performance
but have also brought new security challenges. Traditional methods based on feature rules or thresholds often perform poorly when dealing with complex and diverse attack traffic
especially struggling to identify anomalous behavior targeting the SRH (Segment Routing Header). Therefore
how to achieve efficient and accurate anomaly traffic detection in the SRv6 environment has become an urgent problem to be solved. To this end
this paper proposes a deep learning-based method for anomaly detection of SRv6 network traffic. Experimental results show that the proposed method outperforms traditional machine learning algorithms and some mainstream deep learning models in terms of accuracy
recall
and F1-score
and can effectively identify multiple types of attack traffic. The main innovations of this paper can be summarized as follows: (1) A three-layer mapping mechanism of "anomaly type - observable features - detection index" is constructed to systematically characterize the perceptible features of the unique abnormal behavior of the SRv6 protocol; (2) A traffic image representation method for SRv6 scenarios is proposed
and adaptive extraction of high-dimensional features is achieved by combining residual networks; (3) In the absence of publicly available SRv6 anomaly datasets
a feature extension mechanism based on protocol specifications and threat models is designed to realize a verification experimental framework for SRv6 scenarios. In the SRv6 scenario
this method provides a scalable technical path for security protection of programmable networks.
关键词
Keywords
references
Stefano Previdi , Clarence Filsfils , et al . 2018 . IPv6 Segment Routing Header (SRH) . Internet-Draft draft-ietf-6man-segment-routing-header-14 .
Mo Z , Long B . An Overview of SRv6 Standardization and Application towards 5G-Advanced and 6G [C ] // 2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET) . IEEE , 2022 : 266 - 270 .
Hwang R H , Peng M C , Huang C W , et al . An unsupervised deep learning model for early network traffic anomaly detection [J ] . IEEE Access , 2020 , 8 : 30387 - 30399 .
Wang J , Yu P , Xu S , et al . High-Accuracy Fault Diagnosis for SRv6 TE Policy in Computer Power Networks [C ] // 2024 IEEE/CIC International Conference on Communications in China (ICCC Workshops) . IEEE , 2024 : 60 - 65 .
Liu B . Supervised learning [M ] // Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data . Berlin, Heidelberg : Springer Berlin Heidelberg , 2011 : 63 - 132 .
James G , Witten D , Hastie T , et al . Unsupervised learning [M ] // An introduction to statistical learning: with applications in Python . Cham : Springer International Publishing , 2023 : 503 - 556 .
Van Engelen J E , Hoos H H . A survey on semi-supervised learning [J ] . Machine learning , 2020 , 109 ( 2 ): 373 - 440 .
M. Al-Qatf , Y. Lasheng , M. Al-Habib and K . Al-Sabahi , " Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection ," in IEEE Access , vol. 6 , pp. 52843 - 52856 , 2018, doi: 10.1109/ACCESS.2018.2869577 http://dx.doi.org/10.1109/ACCESS.2018.2869577 .
W . Wan g et al ., " HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection ," in IEEE Access , vol. 6 , pp. 1792 - 1806 , 2018, doi: 10.1109/ACCESS.2017.2780250 http://dx.doi.org/10.1109/ACCESS.2017.2780250 .
He K , Zhang X , Ren S , et al . Delving deep into rectifiers: Surpassing human-level performance on imagenet classification [C ] // Proceedings of the IEEE international conference on computer vision . 2015 : 1026 - 1034 .
Srivastava N , Hinton G , Krizhevsky A , et al . Dropout: a simple way to prevent neural networks from overfitting [J ] . The journal of machine learning research , 2014 , 15 ( 1 ): 1929 - 1958 .
Wang J , Yu P , Xu S , et al . High-Accuracy Fault Diagnosis for SRv6 TE Policy in Computer Power Networks [C ] // 2024 IEEE/CIC International Conference on Communications in China (ICCC Workshops) . IEEE , 2024 : 60 - 65 .
Wang S , Balarezo J F , Kandeepan S , et al . Machine learning in network anomaly detection: A survey [J ] . IEEe Access , 2021 , 9 : 152379 - 152396 .
Szegedy C , Ioffe S , Vanhoucke V , et al . Inception-v4, inception-resnet and the impact of residual connections on learning [C ] // Proceedings of the AAAI conference on artificial intelligence . 2017 , 31(1) .
He K , Zhang X , Ren S , et al . Deep residual learning for image recognition [C ] // Proceedings of the IEEE conference on computer vision and pattern recognition . 2016 : 770 - 778 .
Floristean G R , Udrea A . Detection and Classification of Anomalies in IP Communications Networks [J ] . Journal of Control Engineering and Applied Informatics , 2021 , 23 ( 4 ): 25 - 32 .