Netinfo Security ›› 2026, Vol. 26 ›› Issue (3): 378-388.doi: 10.3969/j.issn.1671-1122.2026.03.004
Previous Articles Next Articles
Received:2025-07-07
Online:2026-03-10
Published:2026-03-30
CLC Number:
HU Wentao, DING Weijie. DiffGuard: Network Traffic Anomaly Detection Based on Diffusion Models and Adaptive Sequence Learning[J]. Netinfo Security, 2026, 26(3): 378-388.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2026.03.004
| 算法 | CIC-IDS-2018数据集 | CIC-DDoS2019数据集 | ||||
|---|---|---|---|---|---|---|
| F1分数 | 精确率 | 召回率 | F1分数 | 精确率 | 召回率 | |
| 隔离森林 | 0.812 | 0.835 | 0.791 | 0.856 | 0.871 | 0.842 |
| DAGMM | 0.901 | 0.910 | 0.892 | 0.925 | 0.931 | 0.919 |
| AnoGAN | 0.919 | 0.908 | 0.931 | 0.933 | 0.931 | 0.937 |
| Tran-AD | 0.936 | 0.941 | 0.931 | 0.945 | 0.953 | 0.937 |
| ABL-ATD | 0.952 | 0.958 | 0.946 | 0.961 | 0.969 | 0.953 |
| DiffGuard | 0.965 | 0.961 | 0.969 | 0.972 | 0.967 | 0.977 |
| [1] | JIANG Jiansen, SHAO An. “Fengqiao Experience” in the New Era: From the Governance Programme to Governance Paradigm[J]. Journal of Zhejiang Police College, 2023(5): 3-19. |
| 蒋建森, 邵安. 新时代“枫桥经验”:从治理方案走向治理范式[J]. 浙江警察学院学报, 2023(5):3-19. | |
| [2] | HU Wentao, XU Jingkai, DING Weijie. Unsupervised Network Traffic Anomaly Detection Based on Abductive Learning[J]. Netinfo Security, 2024, 24(11): 1675-1684. |
| 胡文涛, 徐靖凯, 丁伟杰. 基于溯因学习的无监督网络流量异常检测[J]. 信息网络安全, 2024, 24(11):1675-1684. | |
| [3] | WALLING S, LODH S. Network Intrusion Detection System for IoT Security Using Machine Learning and Statistical Based Hybrid Feature Selection[EB/OL]. (2024-06-05)[2025-06-10]. https://onlinelibrary.wiley.com/doi/abs/10.1002/spy2.429. |
| [4] |
TORABI H, MIRTAHERI S L, GRECO S. Practical Autoencoder Based Anomaly Detection by Using Vector Reconstruction Error[J]. Cybersecurity, 2023, 6: 1-13.
doi: 10.1186/s42400-022-00134-9 |
| [5] | SAXENA D, CAO Jiannong. Generative Adversarial Networks (GANs): Challenges, Solutions, and Future Directions[J]. ACM Computing Surveys, 2022, 54(3): 1-42. |
| [6] | GU Wei, XING Hongyan, HOU Tianhao. Abnormal Traffic Detection Method Based on Traffic Spatial-Temporal Features and Adaptive Weighting Coefficients[J]. Journal of Electronics & Information Technology, 2024, 46(6): 2647-2654. |
| 顾伟, 行鸿彦, 侯天浩. 基于网络流量时空特征和自适应加权系数的异常流量检测方法[J]. 电子与信息学报, 2024, 46(6):2647-2654. | |
| [7] | SUN Xiuxuan, CHEN Jianhua. Graph Wavenet+TimeGrad Probabilistic Model for High-Dimensional Time Series Prediction[C]// IEEE. 2023 International Conference on Machine Learning and Applications (ICMLA). New York: IEEE, 2023: 1833-1838. |
| [8] | TASHIRO Y, SONG Jiaming, SONG Yang, et al. CSDI: Conditional Score-Based Diffusion Models for Probabilistic Time Series Imputation[C]// NeurIPS. Advances in Neural Information Processing Systems. Cambridge: MIT Press, 2021: 24804-24816. |
| [9] | YANG Xue, LI Guojun, XU Bo. Self-Adaption User Behaviour Identification Technology Based on the Analysis of Network Flow[J]. Journal of Zhejiang Police College, 2023(6): 97-114. |
| 杨雪, 李国军, 徐博. 基于网络流量分析的自适应用户行为识别技术[J]. 浙江警察学院学报, 2023(6):97-114. | |
| [10] | JIANG Xi, LIU Shinan, GEMBER-JACOBSON A, et al. NetDiffusion: Network Data Augmentation through Protocol-Constrained Traffic Generation[J]. The ACM on Measurement and Analysis of Computing Systems, 2024, 8(1): 1-32. |
| [11] | XIAO Chunjing, GOU Zehua, TAI Wenxin, et al. Imputation-Based Time-Series Anomaly Detection with Conditional Weight-Incremental Diffusion Models[C]// ACM. The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. New York: ACM, 2023: 2742-2751. |
| [12] | HU Wentao, JIANG Dawei, WU Sai, et al. IceBerg: Deep Generative Modeling for Constraint Discovery and Anomaly Detection[C]// IEEE. 2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom). New York: IEEE, 2022: 74-81. |
| [13] | LIU Yuxiao, CHEN Wei, ZHANG Tianyue, et al. Explainable Anomaly Traffic Detection Based on Sparse Autoencoders[J]. Netinfo Security, 2023, 23(7): 74-85. |
| 刘宇啸, 陈伟, 张天月, 等. 基于稀疏自动编码器的可解释性异常流量检测[J]. 信息网络安全, 2023, 23(7):74-85. | |
| [14] | CHEN Furong, XIONG Chen, LI Ting, et al. A Survey on Time Series Anomaly Detection[J]. Journal of Beijing Jiaotong University, 2025, 49(3): 1-13. |
| 陈福荣, 熊琛, 李婷, 等. 时间序列异常检测综述[J]. 北京交通大学学报, 2025, 49(3):1-13. | |
| [15] |
LI Haitao, WANG Ruimin, DONG Weiyu, et al. Semi-Supervised Network Traffic Anomaly Detection Method Based on GRU[J]. Computer Science, 2023, 50(3): 380-390.
doi: 10.11896/jsjkx.220100032 |
|
李海涛, 王瑞敏, 董卫宇, 等. 一种基于GRU的半监督网络流量异常检测方法[J]. 计算机科学, 2023, 50(3):380-390.
doi: 10.11896/jsjkx.220100032 |
|
| [16] | PANDE S D, LANKE G R, SONI M, et al. Deep Learning-Based Intrusion Detection Model for Network Security[C]// Springer. Intelligent Computing and Networking. Heidelberg: Springer, 2023: 377-386. |
| [17] | LI Shuifang, HONG Fanghua, ZHU Jianyu, et al. Clustering Analysis of Network Anomalous Traffic Based on Spark Platform[C]// CCF. The 33rd National Conference on Computer Security. Beijing: CCF, 2018: 175-179. |
| 李水芳, 洪芳华, 朱剑宇, 等. 基于Spark平台的网络异常流量聚类分析[C]// 中国计算机学会.第33次全国计算机安全学术交流会. 北京: 中国计算机学会,2018:175-179. | |
| [18] | MA Min, FU Yu, HUANG Kai. A Principal Component Analysis Scheme for Security Outsourcing in Cloud Environment Based on Secret Sharing[J]. Netinfo Security, 2023, 23(4): 61-71. |
| 马敏, 付钰, 黄凯. 云环境下基于秘密共享的安全外包主成分分析方案[J]. 信息网络安全, 2023, 23(4):61-71. | |
| [19] | SHARAFALDIN I, LASHKARI A H, GHORBANI A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization[C]// INSTICC. The 4th International Conference on Information Systems Security and Privacy (ICISSP 2018). Setúbal: INSTICC, 2018: 108-116. |
| [20] | CHEN Yang, ZHANG Junzhe, YEO C K. Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model[C]// Springer. Machine Learning for Networking. Heidelberg: Springer, 2020: 1-14. |
| [21] |
TULI S, CASALE G, JENNINGS N R. TranAD: Deep Transformer Networks for Anomaly Detection in Multivariate Time Series Data[J]. Proceedings of the VLDB Endowment, 2022, 15(6): 1201-1214.
doi: 10.14778/3514061.3514067 URL |
| [22] |
LÜER F, BOHM C. Anomaly Detection Using Generative Adversarial Networks Reviewing Methodological Progress and Challenges[J]. ACM SIGKDD Explorations Newsletter, 2024, 25(2): 29-41.
doi: 10.1145/3655103.3655109 URL |
| [23] | ELMRABIT N, ZHOU Feixiang, LI Fengyin, et al. Evaluation of Machine Learning Algorithms for Anomaly Detection[C]// IEEE. 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). New York: IEEE, 2020: 1-8. |
| [1] | KANG Wenjie, LIU Yiguo, LIU Xuchong, ZHAO Wei, OUYANG Tianjian, LI Jiaxin. Research on Collaborative Defense against Cryptojacking Malware Based on Multi-Source Detection and AI Behavior Analysis [J]. Netinfo Security, 2026, 26(3): 389-398. |
| [2] | LIANG Guangjun, QIU Yuchen, SI Hongtao, WANG Qun, MA Zhuo, CHEN Yuqi. Blockchain Virtual Currency Traceability and Analysis [J]. Netinfo Security, 2026, 26(3): 482-490. |
| [3] | LI Dong, GAO Yuan, YU Junqing, ZENG Muhong, CHEN Junxin. Polymorphic Network Control and Security Monitor Based on P4 [J]. Netinfo Security, 2026, 26(1): 115-124. |
| [4] | HU Yucui, GAO Haotian, ZHANG Jie, YU Hang, YANG Bin, FAN Xuejian. Automated Exploitation of Vulnerabilities in Vehicle Network Security [J]. Netinfo Security, 2025, 25(9): 1348-1356. |
| [5] | WEI Songjie, WU Qinqin, YUAN Junyi. Dynamic Detection of Ransomware Based on Enhanced API Sequences with Running Parameters [J]. Netinfo Security, 2025, 25(5): 713-721. |
| [6] | CHEN Hongsong, LIU Xinrui, TAO Zimei, WANG Zhiheng. A Survey of Anomaly Detection Model for Time Series Data Based on Deep Learning [J]. Netinfo Security, 2025, 25(3): 364-391. |
| [7] | LI Hailong, CUI Zhian, SHEN Xieyang. Overview of Anomaly Analysis and Detection Methods for Network Traffic [J]. Netinfo Security, 2025, 25(2): 194-214. |
| [8] | ZHANG Xinyou, GAO Zhichao, FENG Li, XING Huanlai. FFT-iTransformer-Based Cybersecurity Situation Awareness Feature Imputation and Prediction [J]. Netinfo Security, 2025, 25(2): 228-239. |
| [9] | ZHANG Hao, XIE Dazhi, HU Yunsheng, YE Junwei. A Review of Network Anomaly Detection Based on Semi-Supervised Learning [J]. Netinfo Security, 2024, 24(4): 491-508. |
| [10] | WANG Jian, CHEN Lin, WANG Kailun, LIU Jiqiang. Application Layer DDoS Detection Method Based on Spatio-Temporal Graph Neural Network [J]. Netinfo Security, 2024, 24(4): 509-519. |
| [11] | YANG Zhipeng, LIU Daidong, YUAN Junyi, WEI Songjie. Research on Network Local Security Situation Fusion Method Based on Self-Attention Mechanism [J]. Netinfo Security, 2024, 24(3): 398-410. |
| [12] | JIANG Rong, LIU Haitian, LIU Cong. Unsupervised Network Intrusion Detection Method Based on Ensemble Learning [J]. Netinfo Security, 2024, 24(3): 411-426. |
| [13] | ZHANG Guomin, TU Zhixin, XING Changyou, WANG Zipeng, ZHANG Junfeng. Traffic Obfuscation Method for Temporal Features Based on Adversarial Example [J]. Netinfo Security, 2024, 24(12): 1882-1895. |
| [14] | ZHANG Xuan, WAN Liang, LUO Heng, YANG Yang. Automated Botnet Detection Method Based on Two-Stage Graph Learning [J]. Netinfo Security, 2024, 24(12): 1933-1947. |
| [15] | CHEN Baogang, ZHANG Yi, YAN Song. Research on Multi-Factor Continuous Trustworthy Identity Authentication for Users in Civil Aviation Air Traffic Control Operational Information Systems [J]. Netinfo Security, 2024, 24(11): 1632-1642. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||
