SPN: A Method of Few-Shot Traffic Classification With Out-of-Distribution Detection Based on Siamese Prototypical Network

被引:5
作者
Miao, Gongxun [1 ,2 ]
Wu, Guohua [1 ]
Zhang, Zhen [1 ]
Tong, Yongjie [2 ]
Lu, Bing [2 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310018, Peoples R China
[2] Zhongfu Informat Co Ltd, Jinan 250101, Peoples R China
关键词
Task analysis; Feature extraction; Training; Metalearning; Prototypes; Data models; Adaptation models; Telecommunication traffic; Classification algorithms; Computer security; Few-shot; intrusion detection; network traffic classification; out-of-distribution; SPN; MODEL;
D O I
10.1109/ACCESS.2023.3325065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traffic classification has always been one of the important research directions in the field of cyber security. Achieving rapid traffic classification and detecting unknown traffic are critical for preventing network attacks, malicious software, transaction fraud, and other types of cyber security threats. However, most existing models are based on large-scale data and are unable to quickly learn and recognize unknown traffic. Some methods based on few-shot learning solve the problem of rapidly learning new types of traffic, but they cannot detect out-of-distribution samples. Based on this, this paper proposes a few-shot traffic multi-classification method that supports out-of-distribution detection, named SPN. It improves the performance by integrating twin networks into the meta-learning framework based on the idea of metric learning, and introduces margin loss to ensure detection performance. We conduct two types of experiments, and compare them with the relevant baseline methods. The results show that SPN has excellent performance in implementing few-shot multi-classification and out-of-distribution detection, and performs well in intrusion detection.
引用
收藏
页码:114403 / 114414
页数:12
相关论文
共 40 条
[31]   Using Intuitionistic Fuzzy Set for Anomaly Detection of Network Traffic From Flow interaction [J].
Wang, Jinfa ;
Zhao, Hai ;
Xu, Jiuqiang ;
Li, Hequn ;
Zhu, Hongsong ;
Chao, Shuai ;
Zheng, Chunyang .
IEEE ACCESS, 2018, 6 :64801-64816
[32]   HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection [J].
Wang, Wei ;
Sheng, Yiqiang ;
wang, Jinlin ;
Zeng, Xuewen ;
Ye, Xiaozhou ;
Huang, Yongzhong ;
Zhu, Ming .
IEEE ACCESS, 2018, 6 :1792-1806
[33]  
Wang W, 2017, 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P712, DOI 10.1109/ICOIN.2017.7899588
[34]  
Wei HX, 2022, 39 INT C MACHINE LEA
[35]   A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework [J].
Xu, Congyuan ;
Shen, Jizhong ;
Du, Xin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :3540-3552
[36]   Few-shot encrypted traffic classification via multi-task representation enhanced meta-learning [J].
Yang, Chen ;
Xiong, Gang ;
Zhang, Qing ;
Shi, Junzheng ;
Gou, Gaopeng ;
Li, Zhen ;
Liu, Chang .
COMPUTER NETWORKS, 2023, 228
[37]   FS-IDS: A framework for intrusion detection based on few-shot learning [J].
Yang, Jingcheng ;
Li, Hongwei ;
Shao, Shuo ;
Zou, Futai ;
Wu, Yue .
COMPUTERS & SECURITY, 2022, 122
[38]   Revisiting Unsupervised Meta-Learning via the Characteristics of Few-Shot Tasks [J].
Ye, Han-Jia ;
Han, Lu ;
Zhan, De-Chuan .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (03) :3721-3737
[39]  
Zhao L., 2022, Comput. Intell. Neurosci., P1
[40]   Few-shot website fingerprinting attack with cluster adaptation [J].
Zhou, Qiang ;
Wang, Liangmin ;
Zhu, Huijuan ;
Lu, Tong .
COMPUTER NETWORKS, 2023, 229