SPN: A Method of Few-Shot Traffic Classification With Out-of-Distribution Detection Based on Siamese Prototypical Network

被引:5
作者
Miao, Gongxun [1 ,2 ]
Wu, Guohua [1 ]
Zhang, Zhen [1 ]
Tong, Yongjie [2 ]
Lu, Bing [2 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310018, Peoples R China
[2] Zhongfu Informat Co Ltd, Jinan 250101, Peoples R China
关键词
Task analysis; Feature extraction; Training; Metalearning; Prototypes; Data models; Adaptation models; Telecommunication traffic; Classification algorithms; Computer security; Few-shot; intrusion detection; network traffic classification; out-of-distribution; SPN; MODEL;
D O I
10.1109/ACCESS.2023.3325065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traffic classification has always been one of the important research directions in the field of cyber security. Achieving rapid traffic classification and detecting unknown traffic are critical for preventing network attacks, malicious software, transaction fraud, and other types of cyber security threats. However, most existing models are based on large-scale data and are unable to quickly learn and recognize unknown traffic. Some methods based on few-shot learning solve the problem of rapidly learning new types of traffic, but they cannot detect out-of-distribution samples. Based on this, this paper proposes a few-shot traffic multi-classification method that supports out-of-distribution detection, named SPN. It improves the performance by integrating twin networks into the meta-learning framework based on the idea of metric learning, and introduces margin loss to ensure detection performance. We conduct two types of experiments, and compare them with the relevant baseline methods. The results show that SPN has excellent performance in implementing few-shot multi-classification and out-of-distribution detection, and performs well in intrusion detection.
引用
收藏
页码:114403 / 114414
页数:12
相关论文
共 40 条
  • [1] An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection
    Aldwairi, Tamer
    Perera, Dilina
    Novotny, Mark A.
    [J]. COMPUTER NETWORKS, 2018, 144 : 111 - 119
  • [2] Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling
    Alves Resende, Paulo Angelo
    Drummond, Andre Costa
    [J]. SECURITY AND PRIVACY, 2018, 1 (04):
  • [3] Nearest cluster-based intrusion detection through convolutional neural networks
    Andresini, Giuseppina
    Appice, Annalisa
    Malerba, Donato
    [J]. KNOWLEDGE-BASED SYSTEMS, 2021, 216
  • [4] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [5] Chen J., 2020, arXiv
  • [6] XGBoost: A Scalable Tree Boosting System
    Chen, Tianqi
    Guestrin, Carlos
    [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
  • [7] SUPPORT-VECTOR NETWORKS
    CORTES, C
    VAPNIK, V
    [J]. MACHINE LEARNING, 1995, 20 (03) : 273 - 297
  • [8] NEAREST NEIGHBOR PATTERN CLASSIFICATION
    COVER, TM
    HART, PE
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1967, 13 (01) : 21 - +
  • [9] DeVries T, 2018, Arxiv, DOI arXiv:1802.04865
  • [10] Finn C, 2017, PR MACH LEARN RES, V70