2018 8th International Conference on Computer and Knowledge Engineering (ICCKE) 2018
DOI: 10.1109/iccke.2018.8566601
|View full text |Cite
|
Sign up to set email alerts
|

Transfer Learning Based Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Yang et al [28] proposed IDS based on different TL models trained on the imagenet dataset, including VGG-16, VGG-19, InceptionNet, ResNet, and Incep-tionRestNet to develop the model on the CIC-IDS2017 and Car-Hacking datasets. The transfer learning (TL) model proposed by Taghiyarrenani et al, [30] for intrusion detection shows more efficient performance in both labeled and unlabeled data. To extract the attack invariant from the existing attack data set and transfer the knowledge to the target network system, Yanjie et al, [31] proposed a framework for transfer-learning-based network flow generation for deeplearning-based IDS.…”
Section: Related Workmentioning
confidence: 99%
“…Yang et al [28] proposed IDS based on different TL models trained on the imagenet dataset, including VGG-16, VGG-19, InceptionNet, ResNet, and Incep-tionRestNet to develop the model on the CIC-IDS2017 and Car-Hacking datasets. The transfer learning (TL) model proposed by Taghiyarrenani et al, [30] for intrusion detection shows more efficient performance in both labeled and unlabeled data. To extract the attack invariant from the existing attack data set and transfer the knowledge to the target network system, Yanjie et al, [31] proposed a framework for transfer-learning-based network flow generation for deeplearning-based IDS.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, while many existing studies address common issues such as limited training samples or unknown attack detection, they tend to focus on one problem rather than comprehensively evaluating all three issues. In addition, most of the current research, such as in [26,[31][32][33]40,41], has been conducted in traditional networks. In contrast, a few others, including [27,34,35], have explored the IoT, wireless networks, and cloud networks.…”
Section: Transfer Learning In Intrusion Detection Issuesmentioning
confidence: 99%
“…Mapping-based TL maps instances from the source domain and target domain into a new latent space with same features and labels, suitable for training. The training process afterwards may utilize Machine Learning as in [19]. The authors extended DAMA [20] to transform the domains into the common latent space.…”
Section: Transfer Learning Approaches and Ids Studiesmentioning
confidence: 99%