2021
DOI: 10.3390/electronics10101148
|View full text |Cite
|
Sign up to set email alerts
|

PF-TL: Payload Feature-Based Transfer Learning for Dealing with the Lack of Training Data

Abstract: The number of studies on applying machine learning to cyber security has increased over the past few years. These studies, however, are facing difficulties with making themselves usable in the real world, mainly due to the lack of training data and reusability of a created model. While transfer learning seems like a solution to these problems, the number of studies in the field of intrusion detection is still insufficient. Therefore, this study proposes payload feature-based transfer learning as a solution to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 50 publications
(85 reference statements)
0
6
0
Order By: Relevance
“…The data distribution was changed by subjecting the strings to vectorization when features were extracted from the payload segments to change the data distribution. The sampling techniques that were used were custom [35], term frequency-inverse document frequency (TF-IDF), hash, and Word2vec string vectors. As shown in Figure 10, the performance results depend on the type of string vector.…”
Section: Results According To Data Distributionmentioning
confidence: 99%
See 2 more Smart Citations
“…The data distribution was changed by subjecting the strings to vectorization when features were extracted from the payload segments to change the data distribution. The sampling techniques that were used were custom [35], term frequency-inverse document frequency (TF-IDF), hash, and Word2vec string vectors. As shown in Figure 10, the performance results depend on the type of string vector.…”
Section: Results According To Data Distributionmentioning
confidence: 99%
“…First, the training dataset is preprocessed before resampling. For the features of the intrusion detection dataset, we select hybrid features extracted from the domain and attack features according to the process of Jung et al [35]. First, the dataset with imbalanced classes is subjected to preprocessing for feature extraction based on intrusion detection characteristics.…”
Section: Ensemble Mixed Sampling Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Trending research that follow non-classical methods to overcome one or more of the previously mentioned challenges are studied in the literature. Use of GANs and Transfer learning to help in learning phase in case of lack of attack samples can be found in [47], [44], [45].…”
Section: Discussionmentioning
confidence: 99%
“…Transfer learning methods proved to be successful in the fields of NLP, and visual recognition, and recently, IDS models. In [44] authors focused on Handling 2 known problems: Lack of training data and re-usability of created models.The model executes Payload featurebased transfer learning by using the knowledge from an already known domain and create a labelled dataset for a target domain.The source domain is well known attack signatures data. Authors claims the model increases the accuracy of the training data created from the transfer learning by 30% compared to non-transfer learning methods.…”
Section: Model Re-usability and Transfer Learningmentioning
confidence: 99%