I. Introduction
With the rapid development of Internet technology, traditional defense measures such as firewalls and encryption technologies can no longer resist the endless attacks from hackers. As a dynamic and active defense measure, intrusion detection can be more effective than traditional defense technologies. Good detection of whether the data flow in network transmission is abnormal is of great significance to ensure network security, so it has always been the focus of research in the field of network security.