A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection

被引:17
作者
Duan, Ruixue [1 ,2 ]
Li, Dan [1 ]
Tong, Qiang [1 ,3 ]
Yang, Tao [1 ]
Liu, Xiaotong [1 ,3 ]
Liu, Xiulei [1 ,3 ]
机构
[1] Beijing Informat Sci & Technol Univ, Beijing Adv Innovat Ctr Mat Genome Engn, Beijing 100101, Peoples R China
[2] Beijing Lab Natl Econ Secur Early Warning Engn, Beijing 100044, Peoples R China
[3] Beijing Informat Sci & Technol Univ, Lab Data Sci & Informat Studies, Beijing 100101, Peoples R China
基金
北京市自然科学基金;
关键词
GENERATIVE MODEL; NEURAL-NETWORKS; DRUG DISCOVERY;
D O I
10.1155/2021/4259629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathering a large amount of reliable data remains expensive and time-consuming, or even impossible. In this regard, FSL has been shown to have advantages in terms of processing small, abnormal data samples in the huge application space of intrusion detection. FSL can improve ML for scarce data at three levels: the data, the model, and the algorithm levels. Previous knowledge plays an important role in all three approaches. Many promising methods such as data enrichment, the graph neural network model, and multitask learning have also been developed. In this paper, we present a comprehensive review of the latest research progress in the area of FSL. We first introduce the theoretical background to ML and FSL and then describe the general features, advantages, and main methods of FSL. FSL methods such as embedded learning, multitask learning, and generative models are applied to intrusion detection to improve the detection accuracy effectively. Then, the application of FSL to intrusion detection is reviewed in detail, including enriching the dataset by extracting intermediate features, using graph embedding and meta-learning methods to improve the model. Finally, the difficulties of this approach and its prospects for development in the field of intrusion detection are identified based on the previous discussion.</p>
引用
收藏
页数:10
相关论文
共 60 条
  • [1] Low Data Drug Discovery with One-Shot Learning
    Altae-Tran, Han
    Ramsundar, Bharath
    Pappu, Aneesh S.
    Pande, Vijay
    [J]. ACS CENTRAL SCIENCE, 2017, 3 (04) : 283 - 293
  • [2] A Survey of Random Forest Based Methods for Intrusion Detection Systems
    Alves Resende, Paulo Angelo
    Drummond, Andre Costa
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (03)
  • [3] [Anonymous], 2017, ARXIV171008347
  • [4] Strategies for learning in class imbalance problems
    Barandela, R
    Sánchez, JS
    García, V
    Rangel, E
    [J]. PATTERN RECOGNITION, 2003, 36 (03) : 849 - 851
  • [5] A large-scale optical microscopy image dataset of potato tuber for deep learning based plant cell assessment
    Biswas, Sumona
    Barma, Shovan
    [J]. SCIENTIFIC DATA, 2020, 7 (01)
  • [6] Multitask learning
    Caruana, R
    [J]. MACHINE LEARNING, 1997, 28 (01) : 41 - 75
  • [7] A method for resampling imbalanced datasets in binary classification tasks for real-world problems
    Cateni, Silvia
    Colla, Valentina
    Vannucci, Marco
    [J]. NEUROCOMPUTING, 2014, 135 : 32 - 41
  • [8] SMOTE: Synthetic minority over-sampling technique
    Chawla, Nitesh V.
    Bowyer, Kevin W.
    Hall, Lawrence O.
    Kegelmeyer, W. Philip
    [J]. 2002, American Association for Artificial Intelligence (16)
  • [9] Chowdhury MMU, 2017, 2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), P456, DOI 10.1109/UEMCON.2017.8249084
  • [10] AutoAugment: Learning Augmentation Strategies from Data
    Cubuk, Ekin D.
    Zoph, Barret
    Mane, Dandelion
    Vasudevan, Vijay
    Le, Quoc V.
    [J]. 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 113 - 123