Abstract: In recent years, anomalous network traffic has become an important threat to the cyber security. To address the shortcomings of lightweight networks under complex background conditions, this ...