4.4 Article

Leveraging siamese networks for one-shot intrusion detection model

Journal

JOURNAL OF INTELLIGENT INFORMATION SYSTEMS
Volume 60, Issue 2, Pages 407-436

Publisher

SPRINGER
DOI: 10.1007/s10844-022-00747-z

Keywords

Continuous learning; Intrusion detection; Few-shot learning; Siamese Network; CICIDS2017; NSL-KDD; Artificial Neural Network

Ask authors/readers for more resources

This paper investigates the use of supervised machine learning to enhance intrusion detection systems and proposes a complementary approach called one-shot learning, which identifies new attack classes using a limited number of examples. The experimental results confirm the adaptability of this method in handling unknown attacks and the trade-off between performance and the need for distinct class representations.
The use of supervised Machine Learning (ML) to enhance Intrusion Detection Systems (IDS) has been the subject of significant research. Supervised ML is based upon learning by example, demanding significant volumes of representative instances for effective training and the need to retrain the model for every unseen cyber-attack class. However, retraining the models in-situ renders the network susceptible to attacks owing to the time-window required to acquire a sufficient volume of data. Although anomaly detection systems provide a coarse-grained defence against unseen attacks, these approaches are significantly less accurate and suffer from high false-positive rates. Here, a complementary approach referred to as One-Shot Learning, whereby a limited number of examples of a new attack-class is used to identify a new attack-class (out of many) is detailed. The model grants a new cyber-attack classification opportunity for classes that were not seen during training without retraining. A Siamese Network is trained to differentiate between classes based on pairs similarities, rather than features, allowing to identify new and previously unseen attacks. The performance of a pre-trained model to classify new attack-classes based only on one example is evaluated using three mainstream IDS datasets; CICIDS2017, NSL-KDD, and KDD Cup'99. The results confirm the adaptability of the model in classifying unseen attacks and the trade-off between performance and the need for distinctive class representations.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available