融合大语言模型的可信网络异常入侵检测方法
Trusted Network Anomaly Intrusion Detection Method Integrating Large Language Model
摘要: 当前网络异常入侵检测多依赖黑箱模型,缺乏可解释性,难以支持工程师快速理解告警原因并及时响应,从而严重制约了系统的安全防护效率。为此,本文提出一种融合大语言模型的可信网络异常入侵检测方法。该方法首先使用XGBoost对网络流量进行异常识别,并利用SHAP分析特征对判定结果的贡献,揭示模型决策依据;随后,借助大模型将检测结果与SHAP解释整合为自然语言报告,提供直观易读的告警说明与处置建议。实验结果表明,该方法在保持较高检测精度的同时显著提升了模型的可解释性与实际可操作性。
Abstract: Current network anomaly intrusion detection often relies on black-box models, which lack interpretability and hinder engineers’ ability to quickly understand alert causes and respond promptly, thereby severely limiting the efficiency of security protection systems. To address this issue, this paper proposes a trustworthy network anomaly intrusion detection method that integrates large language models. The approach first employs XGBoost to identify anomalies in network traffic and utilizes SHAP to analyze the contribution of features to the detection results, thereby revealing the decision-making basis of the model. Subsequently, a large language model is leveraged to integrate the detection results and SHAP explanations into a natural language report, providing intuitive and easily understandable alert descriptions along with actionable recommendations. Experimental results demonstrate that, while maintaining high detection accuracy, the proposed method significantly enhances model interpretability and practical usability.
文章引用:王付. 融合大语言模型的可信网络异常入侵检测方法[J]. 软件工程与应用, 2025, 14(6): 1258-1269. https://doi.org/10.12677/sea.2025.146111

参考文献

[1] 蹇诗婕, 卢志刚, 杜丹, 等. 网络入侵检测技术综述[J]. 信息安全学报, 2020, 5(4): 96-122.
[2] 封化民, 李明伟, 侯晓莲, 等. 基于SMOTE和GBDT的网络入侵检测方法研究[J]. 计算机应用研究, 2017, 34(12): 3745-3748.
[3] 刘衍珩, 田大新, 余雪岗, 等. 基于分布式学习的大规模网络入侵检测算法[J]. 软件学报, 2008(4): 993-1003.
[4] 周杰英, 贺鹏飞, 邱荣发, 等. 融合随机森林和梯度提升树的入侵检测研究[J]. 软件学报, 2021, 32(10): 3254-3265.
[5] 李辉, 管晓宏, 昝鑫, 等. 基于支持向量机的网络入侵检测[J]. 计算机研究与发展, 2003(6): 799-807.
[6] Louk, M.H.L. and Tama, B.A. (2023) Dual-ids: A Bagging-Based Gradient Boosting Decision Tree Model for Network Anomaly Intrusion Detection System. Expert Systems with Applications, 213, Article 119030. [Google Scholar] [CrossRef
[7] Ayad, A.G., Sakr, N.A. and Hikal, N.A. (2024) A Hybrid Approach for Efficient Feature Selection in Anomaly Intrusion Detection for IoT Networks. The Journal of Supercomputing, 80, 26942-26984. [Google Scholar] [CrossRef