A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection

被引:17
作者
Duan, Ruixue [1 ,2 ]
Li, Dan [1 ]
Tong, Qiang [1 ,3 ]
Yang, Tao [1 ]
Liu, Xiaotong [1 ,3 ]
Liu, Xiulei [1 ,3 ]
机构
[1] Beijing Informat Sci & Technol Univ, Beijing Adv Innovat Ctr Mat Genome Engn, Beijing 100101, Peoples R China
[2] Beijing Lab Natl Econ Secur Early Warning Engn, Beijing 100044, Peoples R China
[3] Beijing Informat Sci & Technol Univ, Lab Data Sci & Informat Studies, Beijing 100101, Peoples R China
基金
北京市自然科学基金;
关键词
GENERATIVE MODEL; NEURAL-NETWORKS; DRUG DISCOVERY;
D O I
10.1155/2021/4259629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathering a large amount of reliable data remains expensive and time-consuming, or even impossible. In this regard, FSL has been shown to have advantages in terms of processing small, abnormal data samples in the huge application space of intrusion detection. FSL can improve ML for scarce data at three levels: the data, the model, and the algorithm levels. Previous knowledge plays an important role in all three approaches. Many promising methods such as data enrichment, the graph neural network model, and multitask learning have also been developed. In this paper, we present a comprehensive review of the latest research progress in the area of FSL. We first introduce the theoretical background to ML and FSL and then describe the general features, advantages, and main methods of FSL. FSL methods such as embedded learning, multitask learning, and generative models are applied to intrusion detection to improve the detection accuracy effectively. Then, the application of FSL to intrusion detection is reviewed in detail, including enriching the dataset by extracting intermediate features, using graph embedding and meta-learning methods to improve the model. Finally, the difficulties of this approach and its prospects for development in the field of intrusion detection are identified based on the previous discussion.</p>
引用
收藏
页数:10
相关论文
共 60 条
  • [51] Learning to Learn: Model Regression Networks for Easy Small Sample Learning
    Wang, Yu-Xiong
    Hebert, Martial
    [J]. COMPUTER VISION - ECCV 2016, PT VI, 2016, 9910 : 616 - 634
  • [52] A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks
    Wu, Kehe
    Chen, Zuge
    Li, Wei
    [J]. IEEE ACCESS, 2018, 6 : 50850 - 50859
  • [53] Secure collaborative few-shot learning
    Xie, Yu
    Wang, Han
    Yu, Bin
    Zhang, Chen
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 203
  • [54] A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework
    Xu, Congyuan
    Shen, Jizhong
    Du, Xin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3540 - 3552
  • [55] A systematic review on hand gesture recognition techniques, challenges and applications
    Yasen, Mais
    Jusoh, Shaidah
    [J]. PEERJ COMPUTER SCIENCE, 2019, 2019 (09)
  • [56] Few-shot learning with adaptively initialized task optimizer: a practical meta-learning approach
    Ye, Han-Jia
    Sheng, Xiang-Rong
    Zhan, De-Chuan
    [J]. MACHINE LEARNING, 2020, 109 (03) : 643 - 664
  • [57] A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
    Yin, Chuanlong
    Zhu, Yuefei
    Fei, Jinlong
    He, Xinzheng
    [J]. IEEE ACCESS, 2017, 5 : 21954 - 21961
  • [58] PBCNN: Packet Bytes-based Convolutional Neural Network for Network Intrusion Detection
    Yu, Lian
    Dong, Jingtao
    Chen, Lihao
    Li, Mengyuan
    Xu, Bingfeng
    Li, Zhao
    Qiao, Lin
    Liu, Lijun
    Zhao, Bei
    Zhang, Chen
    [J]. COMPUTER NETWORKS, 2021, 194
  • [59] Improving Intrusion Detection Systems using Zero-Shot Recognition via Graph Embeddings
    Zerhoudi, Saber
    Granitzer, Michael
    Garchery, Mathieu
    [J]. 2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 790 - 797
  • [60] Flexible Clustered Multi-Task Learning by Learning Representative Tasks
    Zhou, Qiang
    Zhao, Qi
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2016, 38 (02) : 266 - 278