Anomaly detection has wide applications to help people recognize false, intrusion, flaw, equipment failure, etc. In most practical scenarios, the amount of the annotated data and the trusted labels is low, resulting in poor performance of the detection. In this paper, we focus on the anomaly detection for the text type data and propose a detection network based on biological immunity for few-shot detection, by imitating the working mechanism of the immune system of biological organisms. This network enabling the protected system to distinguish the aggressive behavior of “nonself” from the legitimate behavior of “self” by embedding characters. First, it constructs episodic task sets and extracts data representations at the character level. Then, in the pretraining phase, Word2Vec is used to embed the representations. In the meta-learning phase, a dynamic prototype containing encoder, routing, and relation is designed to identify the data traffic. Compare to the mean-based prototype, the proposed prototype applies a dynamic routing algorithm that assigns different weights to samples in the support set through multiple iterations to obtain a prototype that combines the distribution of samples. The proposed method is validated on 2 real traffic datasets. The experimental results indicate that (a) the proposed anomaly detection prototype outperforms state-of-the-art few-shot techniques with 1.3% to 4.48% accuracy and 0.18% to 4.55% recall; (b) under the premise of ensuring the accuracy and recall, the number of training samples is reduced to 5 or 10; (c) ablation experiments are designed for each module, and the results show that more accurate prototypes can be obtained by using the dynamic routing algorithm.
Tian Y, Liao H, Xu J, Wang Y, Yuan S, Liu N. Unsupervised spectrum anomaly detection method for unauthorized bands. Space Sci Technol, 2022:9865016.
Min E, Long J, Liu Q, Cui J, Chen W. TR-IDS: Anomaly-based intrusion detection through text-convolutional neural network and random forest. Secur Commun Netw, 2018:4943509.
Liu R, Ren C, Fu M, Chu Z, Guo J. Platelet detection based on improved YOLO_v3. Cyborg Bionic Syst, 2022:9780569.
Injadat M, Moubayed A, Nassif AB, Shami A. Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans Netw Serv Manag, 2021,18(2):1803–1816.
Marir N, Wang H, Feng G, Li B, Jia M. Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark. IEEE Access, 2018(6):59657–59671.
Yulianto A, Sukarno P, Suwastika NA. Improving AdaBoost-based intrusion detection system (IDS) performance on CICIDS 2017 dataset. J Phys Conf Ser, 2019(1192):Article 012018.
Al-Yaseen WL, Othman ZA, Nazri MZA. Multi-level hybrid support vector machine and extreme learning machine based on modified k-means for intrusion detection system. Expert Syst Appl, 2017(67):296–303.
Liu J, Gao Y, Hu F. A fast network intrusion detection system using adaptive synthetic oversampling and lightgbm. Comput Secur, 2021(106):Article 102289.
Min B, Yoo J, Kim S, Shin D, Shin D. Network anomaly detection using memory-augmented deep autoencoder. IEEE Access, 2021(9):104695–104706.
Andresini G, Appice A, Malerba D. Nearest cluster-based intrusion detection through convolutional neural networks. Knowl-Based Syst, 2021(216):Article 106798.
Zheng F, Yan Q, Leung VC, Yu FR, Ming Z. HDP-CNN: Highway deep pyramid convolution neural network combining word-level and character-level representations for phishing website detection. Comput Secur, 2022(114):Article 102584.
Shi Z, Wang T, Huang Z, Xie F, Song G. A method for the automatic detection of myopia in optos fundus images based on deep learning. Int J Numer Methods Biomed Eng, 2021,37(6):Article e3460.
Pekta A, Acarman T. A deep learning method to detect network intrusion through flow-based features. Int J Netw Manag, 2019,29(3):e2050.
Kim J, Kim J, Kim H, Shim M, Choi E. Cnn-based network intrusion detection against denial-of-service attacks. Electronics, 2020,9(6):916.
Imrana Y, Xiang Y, Ali L, Abdul-Rauf Z. A bidirectional lstm deep learning approach for intrusion detection. Expert Syst Appl, 2021(185):Article 115524.
Xu C, Shen J, Du X. A method of few-shot network intrusion detection based on meta-learning framework. IEEE Trans Inf Forensics Secur, 2020(15):3540–3552.
Wang Z-M, Tian J-Y, Qin J, Fang H, Chen L-M. A few-shot learning-based siamese capsule network for intrusion detection with imbalanced training data. Comput Intell Neurosci, 2021(2021):7126913.
Ye T, Li G, Ahmad I, Zhang C, Lin X, Li J. FLAG: Few-shot latent dirichlet generative learning for semantic-aware traffic detection. IEEE Trans Netw Serv Manag, 2021,19(1):73–88.
Yang J, Li H, Shao S, Zou F, Wu Y. FS-IDS: A framework for intrusion detection based on few-shot learning. Comput Secur, 2022(122):Article 102899.
Yu Y, Bian N. An intrusion detection method using few-shot learning. IEEE Access, 2020(8):49730–49740.
Zhan G, Wang W, Sun H, Hou Y, Feng L. Auto-CSC: A transfer learning based automatic cell segmentation and count framework. Cyborg Bionic Syst, 2022:9842349.
Bai D, Liu T, Han X, Yi H. Application research on optimization algorithm of sEMG Gesture recognition based on light CNN+LSTM model. Cyborg Bionic Syst, 2021:9794610.
de Souza CA, Westphall CB, Machado RB, Sobral JBM, dos Santos Vieira G. Hybrid approach to intrusion detection in fog-based IoT environments. Comput Netw, 2020(180):Article 107417.
van der Maaten L, Hinton G. Visualizing data using t-SNE. J Mach Learn Res, 2008,9(86):2579–2605.
Resende PAA, Drummond AC. Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling. Secur Priv, 2018,1(4):Article e36.
Zhang Y, Chen X, Jin L, Wang X, Guo D. Network intrusion detection: Based on deep hierarchical network and original flow data. IEEE Access, 2019(7):37004–37016.
Zhang X, Shenglin Y. Intrusion detection model of random attention capsule network based on variable fusion. J Commun, 2020,41(11):160.