A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection
Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathe...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2021-10, Vol.2021, p.1-10 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2021 |
creator | Duan, Ruixue Li, Dan Tong, Qiang Yang, Tao Liu, Xiaotong Liu, Xiulei |
description | Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathering a large amount of reliable data remains expensive and time-consuming, or even impossible. In this regard, FSL has been shown to have advantages in terms of processing small, abnormal data samples in the huge application space of intrusion detection. FSL can improve ML for scarce data at three levels: the data, the model, and the algorithm levels. Previous knowledge plays an important role in all three approaches. Many promising methods such as data enrichment, the graph neural network model, and multitask learning have also been developed. In this paper, we present a comprehensive review of the latest research progress in the area of FSL. We first introduce the theoretical background to ML and FSL and then describe the general features, advantages, and main methods of FSL. FSL methods such as embedded learning, multitask learning, and generative models are applied to intrusion detection to improve the detection accuracy effectively. Then, the application of FSL to intrusion detection is reviewed in detail, including enriching the dataset by extracting intermediate features, using graph embedding and meta-learning methods to improve the model. Finally, the difficulties of this approach and its prospects for development in the field of intrusion detection are identified based on the previous discussion. |
doi_str_mv | 10.1155/2021/4259629 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2594361579</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2594361579</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-fe40c90aae11e44deff31af5c973bc2dd9956ea23bbcb8b063470be46acfc3dd3</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKs3f0DAo67N1-4ab6UfWql4qJ6XbDKxWzSpSbal_94tLR49zcA8zMv7IHRNyT2leT5ghNGBYLksmDxBPSq5zAhl7PRvp-IcXcS4IqSgohQ99DLEizZsYIe9xVPYZoulT3gOKrjGfT7iocMTa0GnZgP4FdLSG2x9wDOXQhsb7_AY0v7s3SU6s-orwtVx9tHHdPI-es7mb0-z0XCeac7LlFkQREuiFFAKQhiwllNlcy1LXmtmjJR5AYrxutb1Q00KLkpSgyiUtpobw_vo5vB3HfxPCzFVK98G10VWXXXBC5qXsqPuDpQOPsYAtlqH5luFXUVJtbdV7W1VR1sdfnvAl40zatv8T_8Ceh5pOg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2594361579</pqid></control><display><type>article</type><title>A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection</title><source>Wiley-Blackwell Open Access Titles</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Duan, Ruixue ; Li, Dan ; Tong, Qiang ; Yang, Tao ; Liu, Xiaotong ; Liu, Xiulei</creator><contributor>Guo, Yunchuan ; Yunchuan Guo</contributor><creatorcontrib>Duan, Ruixue ; Li, Dan ; Tong, Qiang ; Yang, Tao ; Liu, Xiaotong ; Liu, Xiulei ; Guo, Yunchuan ; Yunchuan Guo</creatorcontrib><description>Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathering a large amount of reliable data remains expensive and time-consuming, or even impossible. In this regard, FSL has been shown to have advantages in terms of processing small, abnormal data samples in the huge application space of intrusion detection. FSL can improve ML for scarce data at three levels: the data, the model, and the algorithm levels. Previous knowledge plays an important role in all three approaches. Many promising methods such as data enrichment, the graph neural network model, and multitask learning have also been developed. In this paper, we present a comprehensive review of the latest research progress in the area of FSL. We first introduce the theoretical background to ML and FSL and then describe the general features, advantages, and main methods of FSL. FSL methods such as embedded learning, multitask learning, and generative models are applied to intrusion detection to improve the detection accuracy effectively. Then, the application of FSL to intrusion detection is reviewed in detail, including enriching the dataset by extracting intermediate features, using graph embedding and meta-learning methods to improve the model. Finally, the difficulties of this approach and its prospects for development in the field of intrusion detection are identified based on the previous discussion.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2021/4259629</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Accuracy ; Algorithms ; Artificial intelligence ; Blacklisting ; Classification ; Datasets ; Embedding ; Feature extraction ; Graph neural networks ; Image retrieval ; Intrusion ; Machine learning ; Methods ; Neural networks ; Support vector machines</subject><ispartof>Security and communication networks, 2021-10, Vol.2021, p.1-10</ispartof><rights>Copyright © 2021 Ruixue Duan et al.</rights><rights>Copyright © 2021 Ruixue Duan et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-fe40c90aae11e44deff31af5c973bc2dd9956ea23bbcb8b063470be46acfc3dd3</citedby><cites>FETCH-LOGICAL-c337t-fe40c90aae11e44deff31af5c973bc2dd9956ea23bbcb8b063470be46acfc3dd3</cites><orcidid>0000-0002-4989-9286 ; 0000-0002-3495-4254 ; 0000-0002-4478-1692 ; 0000-0003-0508-0727 ; 0000-0002-9058-6150 ; 0000-0002-9303-3682</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><contributor>Guo, Yunchuan</contributor><contributor>Yunchuan Guo</contributor><creatorcontrib>Duan, Ruixue</creatorcontrib><creatorcontrib>Li, Dan</creatorcontrib><creatorcontrib>Tong, Qiang</creatorcontrib><creatorcontrib>Yang, Tao</creatorcontrib><creatorcontrib>Liu, Xiaotong</creatorcontrib><creatorcontrib>Liu, Xiulei</creatorcontrib><title>A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection</title><title>Security and communication networks</title><description>Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathering a large amount of reliable data remains expensive and time-consuming, or even impossible. In this regard, FSL has been shown to have advantages in terms of processing small, abnormal data samples in the huge application space of intrusion detection. FSL can improve ML for scarce data at three levels: the data, the model, and the algorithm levels. Previous knowledge plays an important role in all three approaches. Many promising methods such as data enrichment, the graph neural network model, and multitask learning have also been developed. In this paper, we present a comprehensive review of the latest research progress in the area of FSL. We first introduce the theoretical background to ML and FSL and then describe the general features, advantages, and main methods of FSL. FSL methods such as embedded learning, multitask learning, and generative models are applied to intrusion detection to improve the detection accuracy effectively. Then, the application of FSL to intrusion detection is reviewed in detail, including enriching the dataset by extracting intermediate features, using graph embedding and meta-learning methods to improve the model. Finally, the difficulties of this approach and its prospects for development in the field of intrusion detection are identified based on the previous discussion.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Blacklisting</subject><subject>Classification</subject><subject>Datasets</subject><subject>Embedding</subject><subject>Feature extraction</subject><subject>Graph neural networks</subject><subject>Image retrieval</subject><subject>Intrusion</subject><subject>Machine learning</subject><subject>Methods</subject><subject>Neural networks</subject><subject>Support vector machines</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kE1LAzEQhoMoWKs3f0DAo67N1-4ab6UfWql4qJ6XbDKxWzSpSbal_94tLR49zcA8zMv7IHRNyT2leT5ghNGBYLksmDxBPSq5zAhl7PRvp-IcXcS4IqSgohQ99DLEizZsYIe9xVPYZoulT3gOKrjGfT7iocMTa0GnZgP4FdLSG2x9wDOXQhsb7_AY0v7s3SU6s-orwtVx9tHHdPI-es7mb0-z0XCeac7LlFkQREuiFFAKQhiwllNlcy1LXmtmjJR5AYrxutb1Q00KLkpSgyiUtpobw_vo5vB3HfxPCzFVK98G10VWXXXBC5qXsqPuDpQOPsYAtlqH5luFXUVJtbdV7W1VR1sdfnvAl40zatv8T_8Ceh5pOg</recordid><startdate>20211031</startdate><enddate>20211031</enddate><creator>Duan, Ruixue</creator><creator>Li, Dan</creator><creator>Tong, Qiang</creator><creator>Yang, Tao</creator><creator>Liu, Xiaotong</creator><creator>Liu, Xiulei</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-4989-9286</orcidid><orcidid>https://orcid.org/0000-0002-3495-4254</orcidid><orcidid>https://orcid.org/0000-0002-4478-1692</orcidid><orcidid>https://orcid.org/0000-0003-0508-0727</orcidid><orcidid>https://orcid.org/0000-0002-9058-6150</orcidid><orcidid>https://orcid.org/0000-0002-9303-3682</orcidid></search><sort><creationdate>20211031</creationdate><title>A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection</title><author>Duan, Ruixue ; Li, Dan ; Tong, Qiang ; Yang, Tao ; Liu, Xiaotong ; Liu, Xiulei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-fe40c90aae11e44deff31af5c973bc2dd9956ea23bbcb8b063470be46acfc3dd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Blacklisting</topic><topic>Classification</topic><topic>Datasets</topic><topic>Embedding</topic><topic>Feature extraction</topic><topic>Graph neural networks</topic><topic>Image retrieval</topic><topic>Intrusion</topic><topic>Machine learning</topic><topic>Methods</topic><topic>Neural networks</topic><topic>Support vector machines</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Duan, Ruixue</creatorcontrib><creatorcontrib>Li, Dan</creatorcontrib><creatorcontrib>Tong, Qiang</creatorcontrib><creatorcontrib>Yang, Tao</creatorcontrib><creatorcontrib>Liu, Xiaotong</creatorcontrib><creatorcontrib>Liu, Xiulei</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Duan, Ruixue</au><au>Li, Dan</au><au>Tong, Qiang</au><au>Yang, Tao</au><au>Liu, Xiaotong</au><au>Liu, Xiulei</au><au>Guo, Yunchuan</au><au>Yunchuan Guo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection</atitle><jtitle>Security and communication networks</jtitle><date>2021-10-31</date><risdate>2021</risdate><volume>2021</volume><spage>1</spage><epage>10</epage><pages>1-10</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathering a large amount of reliable data remains expensive and time-consuming, or even impossible. In this regard, FSL has been shown to have advantages in terms of processing small, abnormal data samples in the huge application space of intrusion detection. FSL can improve ML for scarce data at three levels: the data, the model, and the algorithm levels. Previous knowledge plays an important role in all three approaches. Many promising methods such as data enrichment, the graph neural network model, and multitask learning have also been developed. In this paper, we present a comprehensive review of the latest research progress in the area of FSL. We first introduce the theoretical background to ML and FSL and then describe the general features, advantages, and main methods of FSL. FSL methods such as embedded learning, multitask learning, and generative models are applied to intrusion detection to improve the detection accuracy effectively. Then, the application of FSL to intrusion detection is reviewed in detail, including enriching the dataset by extracting intermediate features, using graph embedding and meta-learning methods to improve the model. Finally, the difficulties of this approach and its prospects for development in the field of intrusion detection are identified based on the previous discussion.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2021/4259629</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-4989-9286</orcidid><orcidid>https://orcid.org/0000-0002-3495-4254</orcidid><orcidid>https://orcid.org/0000-0002-4478-1692</orcidid><orcidid>https://orcid.org/0000-0003-0508-0727</orcidid><orcidid>https://orcid.org/0000-0002-9058-6150</orcidid><orcidid>https://orcid.org/0000-0002-9303-3682</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2021-10, Vol.2021, p.1-10 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2594361579 |
source | Wiley-Blackwell Open Access Titles; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Accuracy Algorithms Artificial intelligence Blacklisting Classification Datasets Embedding Feature extraction Graph neural networks Image retrieval Intrusion Machine learning Methods Neural networks Support vector machines |
title | A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T10%3A52%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20of%20Few-Shot%20Learning:%20An%20Effective%20Method%20for%20Intrusion%20Detection&rft.jtitle=Security%20and%20communication%20networks&rft.au=Duan,%20Ruixue&rft.date=2021-10-31&rft.volume=2021&rft.spage=1&rft.epage=10&rft.pages=1-10&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2021/4259629&rft_dat=%3Cproquest_cross%3E2594361579%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2594361579&rft_id=info:pmid/&rfr_iscdi=true |