2022
DOI: 10.1007/s10844-022-00747-z
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging siamese networks for one-shot intrusion detection model

Abstract: The use of supervised Machine Learning (ML) to enhance Intrusion Detection Systems (IDS) has been the subject of significant research. Supervised ML is based upon learning by example, demanding significant volumes of representative instances for effective training and the need to retrain the model for every unseen cyber-attack class. However, retraining the models in-situ renders the network susceptible to attacks owing to the time-window required to acquire a sufficient volume of data. Although anomaly detect… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 37 publications
0
4
0
Order By: Relevance
“…However, their model still requires a large amount of data to gain the detection rate they achieved. In [9] They performed binary classification on two datasets, namely ISCX2012 and CICIDS2017. However, specific attack related countermeasures cannot be taken as the classification indicates whether a network is benign or malicious.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, their model still requires a large amount of data to gain the detection rate they achieved. In [9] They performed binary classification on two datasets, namely ISCX2012 and CICIDS2017. However, specific attack related countermeasures cannot be taken as the classification indicates whether a network is benign or malicious.…”
Section: Related Workmentioning
confidence: 99%
“…In [9], authors recommended a Siamese Network using a one-shot learning mechanism to classify cyber attacks. In total, they used 274729 samples for their experiment.…”
Section: Comparative Studymentioning
confidence: 99%
“…The performance of the traditional deep learning(DL) technique relies heavily on collecting a large amount of user data as a prerequisite, especially assuming that the represented data distribution is relatively stationary without dynamic changes. Towards robust and efficient model retraining, we utilize a one-shot learning approach based on the Siamese network [ 27 , 28 , 29 ], with two core techniques: first component reverse (FCR) extraction and convolution block attention module (CBAM), achieving high model robustness and performance in heterogeneous scenarios (e.g., identifying unseen users). A unique velocity distribution profiling (VDP) is calculated from a double-source interference pattern, reflecting the personal motion features.…”
Section: Introductionmentioning
confidence: 99%
“…The NSL-KDD dataset, which may be used to assess anomaly detection accuracy, was utilized as a benchmark dataset for network infiltration. It was possible to identify and categorize normal or aberrant connections when assessed using the test results [27]. Applying strategies such as stacked autoencoding, a deep belief net version of sparse autoencoding, for unsupervised feature learning and NB-Tree, Random Tree, or J48 for additional categorization boosted performance even more [28].…”
mentioning
confidence: 99%