A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection

Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathe...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2021-10, Vol.2021, p.1-10
Hauptverfasser: Duan, Ruixue, Li, Dan, Tong, Qiang, Yang, Tao, Liu, Xiaotong, Liu, Xiulei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10
container_issue
container_start_page 1
container_title Security and communication networks
container_volume 2021
creator Duan, Ruixue
Li, Dan
Tong, Qiang
Yang, Tao
Liu, Xiaotong
Liu, Xiulei
description Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathering a large amount of reliable data remains expensive and time-consuming, or even impossible. In this regard, FSL has been shown to have advantages in terms of processing small, abnormal data samples in the huge application space of intrusion detection. FSL can improve ML for scarce data at three levels: the data, the model, and the algorithm levels. Previous knowledge plays an important role in all three approaches. Many promising methods such as data enrichment, the graph neural network model, and multitask learning have also been developed. In this paper, we present a comprehensive review of the latest research progress in the area of FSL. We first introduce the theoretical background to ML and FSL and then describe the general features, advantages, and main methods of FSL. FSL methods such as embedded learning, multitask learning, and generative models are applied to intrusion detection to improve the detection accuracy effectively. Then, the application of FSL to intrusion detection is reviewed in detail, including enriching the dataset by extracting intermediate features, using graph embedding and meta-learning methods to improve the model. Finally, the difficulties of this approach and its prospects for development in the field of intrusion detection are identified based on the previous discussion.
doi_str_mv 10.1155/2021/4259629
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2594361579</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2594361579</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-fe40c90aae11e44deff31af5c973bc2dd9956ea23bbcb8b063470be46acfc3dd3</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKs3f0DAo67N1-4ab6UfWql4qJ6XbDKxWzSpSbal_94tLR49zcA8zMv7IHRNyT2leT5ghNGBYLksmDxBPSq5zAhl7PRvp-IcXcS4IqSgohQ99DLEizZsYIe9xVPYZoulT3gOKrjGfT7iocMTa0GnZgP4FdLSG2x9wDOXQhsb7_AY0v7s3SU6s-orwtVx9tHHdPI-es7mb0-z0XCeac7LlFkQREuiFFAKQhiwllNlcy1LXmtmjJR5AYrxutb1Q00KLkpSgyiUtpobw_vo5vB3HfxPCzFVK98G10VWXXXBC5qXsqPuDpQOPsYAtlqH5luFXUVJtbdV7W1VR1sdfnvAl40zatv8T_8Ceh5pOg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2594361579</pqid></control><display><type>article</type><title>A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection</title><source>Wiley-Blackwell Open Access Titles</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Duan, Ruixue ; Li, Dan ; Tong, Qiang ; Yang, Tao ; Liu, Xiaotong ; Liu, Xiulei</creator><contributor>Guo, Yunchuan ; Yunchuan Guo</contributor><creatorcontrib>Duan, Ruixue ; Li, Dan ; Tong, Qiang ; Yang, Tao ; Liu, Xiaotong ; Liu, Xiulei ; Guo, Yunchuan ; Yunchuan Guo</creatorcontrib><description>Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathering a large amount of reliable data remains expensive and time-consuming, or even impossible. In this regard, FSL has been shown to have advantages in terms of processing small, abnormal data samples in the huge application space of intrusion detection. FSL can improve ML for scarce data at three levels: the data, the model, and the algorithm levels. Previous knowledge plays an important role in all three approaches. Many promising methods such as data enrichment, the graph neural network model, and multitask learning have also been developed. In this paper, we present a comprehensive review of the latest research progress in the area of FSL. We first introduce the theoretical background to ML and FSL and then describe the general features, advantages, and main methods of FSL. FSL methods such as embedded learning, multitask learning, and generative models are applied to intrusion detection to improve the detection accuracy effectively. Then, the application of FSL to intrusion detection is reviewed in detail, including enriching the dataset by extracting intermediate features, using graph embedding and meta-learning methods to improve the model. Finally, the difficulties of this approach and its prospects for development in the field of intrusion detection are identified based on the previous discussion.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2021/4259629</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Accuracy ; Algorithms ; Artificial intelligence ; Blacklisting ; Classification ; Datasets ; Embedding ; Feature extraction ; Graph neural networks ; Image retrieval ; Intrusion ; Machine learning ; Methods ; Neural networks ; Support vector machines</subject><ispartof>Security and communication networks, 2021-10, Vol.2021, p.1-10</ispartof><rights>Copyright © 2021 Ruixue Duan et al.</rights><rights>Copyright © 2021 Ruixue Duan et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-fe40c90aae11e44deff31af5c973bc2dd9956ea23bbcb8b063470be46acfc3dd3</citedby><cites>FETCH-LOGICAL-c337t-fe40c90aae11e44deff31af5c973bc2dd9956ea23bbcb8b063470be46acfc3dd3</cites><orcidid>0000-0002-4989-9286 ; 0000-0002-3495-4254 ; 0000-0002-4478-1692 ; 0000-0003-0508-0727 ; 0000-0002-9058-6150 ; 0000-0002-9303-3682</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><contributor>Guo, Yunchuan</contributor><contributor>Yunchuan Guo</contributor><creatorcontrib>Duan, Ruixue</creatorcontrib><creatorcontrib>Li, Dan</creatorcontrib><creatorcontrib>Tong, Qiang</creatorcontrib><creatorcontrib>Yang, Tao</creatorcontrib><creatorcontrib>Liu, Xiaotong</creatorcontrib><creatorcontrib>Liu, Xiulei</creatorcontrib><title>A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection</title><title>Security and communication networks</title><description>Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathering a large amount of reliable data remains expensive and time-consuming, or even impossible. In this regard, FSL has been shown to have advantages in terms of processing small, abnormal data samples in the huge application space of intrusion detection. FSL can improve ML for scarce data at three levels: the data, the model, and the algorithm levels. Previous knowledge plays an important role in all three approaches. Many promising methods such as data enrichment, the graph neural network model, and multitask learning have also been developed. In this paper, we present a comprehensive review of the latest research progress in the area of FSL. We first introduce the theoretical background to ML and FSL and then describe the general features, advantages, and main methods of FSL. FSL methods such as embedded learning, multitask learning, and generative models are applied to intrusion detection to improve the detection accuracy effectively. Then, the application of FSL to intrusion detection is reviewed in detail, including enriching the dataset by extracting intermediate features, using graph embedding and meta-learning methods to improve the model. Finally, the difficulties of this approach and its prospects for development in the field of intrusion detection are identified based on the previous discussion.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Blacklisting</subject><subject>Classification</subject><subject>Datasets</subject><subject>Embedding</subject><subject>Feature extraction</subject><subject>Graph neural networks</subject><subject>Image retrieval</subject><subject>Intrusion</subject><subject>Machine learning</subject><subject>Methods</subject><subject>Neural networks</subject><subject>Support vector machines</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kE1LAzEQhoMoWKs3f0DAo67N1-4ab6UfWql4qJ6XbDKxWzSpSbal_94tLR49zcA8zMv7IHRNyT2leT5ghNGBYLksmDxBPSq5zAhl7PRvp-IcXcS4IqSgohQ99DLEizZsYIe9xVPYZoulT3gOKrjGfT7iocMTa0GnZgP4FdLSG2x9wDOXQhsb7_AY0v7s3SU6s-orwtVx9tHHdPI-es7mb0-z0XCeac7LlFkQREuiFFAKQhiwllNlcy1LXmtmjJR5AYrxutb1Q00KLkpSgyiUtpobw_vo5vB3HfxPCzFVK98G10VWXXXBC5qXsqPuDpQOPsYAtlqH5luFXUVJtbdV7W1VR1sdfnvAl40zatv8T_8Ceh5pOg</recordid><startdate>20211031</startdate><enddate>20211031</enddate><creator>Duan, Ruixue</creator><creator>Li, Dan</creator><creator>Tong, Qiang</creator><creator>Yang, Tao</creator><creator>Liu, Xiaotong</creator><creator>Liu, Xiulei</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-4989-9286</orcidid><orcidid>https://orcid.org/0000-0002-3495-4254</orcidid><orcidid>https://orcid.org/0000-0002-4478-1692</orcidid><orcidid>https://orcid.org/0000-0003-0508-0727</orcidid><orcidid>https://orcid.org/0000-0002-9058-6150</orcidid><orcidid>https://orcid.org/0000-0002-9303-3682</orcidid></search><sort><creationdate>20211031</creationdate><title>A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection</title><author>Duan, Ruixue ; Li, Dan ; Tong, Qiang ; Yang, Tao ; Liu, Xiaotong ; Liu, Xiulei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-fe40c90aae11e44deff31af5c973bc2dd9956ea23bbcb8b063470be46acfc3dd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Blacklisting</topic><topic>Classification</topic><topic>Datasets</topic><topic>Embedding</topic><topic>Feature extraction</topic><topic>Graph neural networks</topic><topic>Image retrieval</topic><topic>Intrusion</topic><topic>Machine learning</topic><topic>Methods</topic><topic>Neural networks</topic><topic>Support vector machines</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Duan, Ruixue</creatorcontrib><creatorcontrib>Li, Dan</creatorcontrib><creatorcontrib>Tong, Qiang</creatorcontrib><creatorcontrib>Yang, Tao</creatorcontrib><creatorcontrib>Liu, Xiaotong</creatorcontrib><creatorcontrib>Liu, Xiulei</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Duan, Ruixue</au><au>Li, Dan</au><au>Tong, Qiang</au><au>Yang, Tao</au><au>Liu, Xiaotong</au><au>Liu, Xiulei</au><au>Guo, Yunchuan</au><au>Yunchuan Guo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection</atitle><jtitle>Security and communication networks</jtitle><date>2021-10-31</date><risdate>2021</risdate><volume>2021</volume><spage>1</spage><epage>10</epage><pages>1-10</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathering a large amount of reliable data remains expensive and time-consuming, or even impossible. In this regard, FSL has been shown to have advantages in terms of processing small, abnormal data samples in the huge application space of intrusion detection. FSL can improve ML for scarce data at three levels: the data, the model, and the algorithm levels. Previous knowledge plays an important role in all three approaches. Many promising methods such as data enrichment, the graph neural network model, and multitask learning have also been developed. In this paper, we present a comprehensive review of the latest research progress in the area of FSL. We first introduce the theoretical background to ML and FSL and then describe the general features, advantages, and main methods of FSL. FSL methods such as embedded learning, multitask learning, and generative models are applied to intrusion detection to improve the detection accuracy effectively. Then, the application of FSL to intrusion detection is reviewed in detail, including enriching the dataset by extracting intermediate features, using graph embedding and meta-learning methods to improve the model. Finally, the difficulties of this approach and its prospects for development in the field of intrusion detection are identified based on the previous discussion.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2021/4259629</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-4989-9286</orcidid><orcidid>https://orcid.org/0000-0002-3495-4254</orcidid><orcidid>https://orcid.org/0000-0002-4478-1692</orcidid><orcidid>https://orcid.org/0000-0003-0508-0727</orcidid><orcidid>https://orcid.org/0000-0002-9058-6150</orcidid><orcidid>https://orcid.org/0000-0002-9303-3682</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2021-10, Vol.2021, p.1-10
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2594361579
source Wiley-Blackwell Open Access Titles; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Accuracy
Algorithms
Artificial intelligence
Blacklisting
Classification
Datasets
Embedding
Feature extraction
Graph neural networks
Image retrieval
Intrusion
Machine learning
Methods
Neural networks
Support vector machines
title A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T10%3A52%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20of%20Few-Shot%20Learning:%20An%20Effective%20Method%20for%20Intrusion%20Detection&rft.jtitle=Security%20and%20communication%20networks&rft.au=Duan,%20Ruixue&rft.date=2021-10-31&rft.volume=2021&rft.spage=1&rft.epage=10&rft.pages=1-10&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2021/4259629&rft_dat=%3Cproquest_cross%3E2594361579%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2594361579&rft_id=info:pmid/&rfr_iscdi=true