PDF (8.7 MB)
Collect
Submit Manuscript
Show Outline
Outline
Abstract
References
Show full outline
Hide outline
Research Article | Open Access

A Biological Immunity-Based Neuro Prototype for Few-Shot Anomaly Detection with Character Embedding

Zhongjing Ma1Zhan Chen1Xiaochen Zheng2Tianyu Wang1Yuyang You1Suli Zou1Yu Wang3()
School of Automation, Beijing Institute of Technology, Beijing 100081, China
ETH AI Center, Andreasstrasse 5, 8092 Zürich, Switzerland
State Key Lab of Multimodal Artificial Intelligence Systems, Institute of Automation, Chinese Academy of Sciences, Beijing 100095, China
Show Author Information

Abstract

Anomaly detection has wide applications to help people recognize false, intrusion, flaw, equipment failure, etc. In most practical scenarios, the amount of the annotated data and the trusted labels is low, resulting in poor performance of the detection. In this paper, we focus on the anomaly detection for the text type data and propose a detection network based on biological immunity for few-shot detection, by imitating the working mechanism of the immune system of biological organisms. This network enabling the protected system to distinguish the aggressive behavior of “nonself” from the legitimate behavior of “self” by embedding characters. First, it constructs episodic task sets and extracts data representations at the character level. Then, in the pretraining phase, Word2Vec is used to embed the representations. In the meta-learning phase, a dynamic prototype containing encoder, routing, and relation is designed to identify the data traffic. Compare to the mean-based prototype, the proposed prototype applies a dynamic routing algorithm that assigns different weights to samples in the support set through multiple iterations to obtain a prototype that combines the distribution of samples. The proposed method is validated on 2 real traffic datasets. The experimental results indicate that (a) the proposed anomaly detection prototype outperforms state-of-the-art few-shot techniques with 1.3% to 4.48% accuracy and 0.18% to 4.55% recall; (b) under the premise of ensuring the accuracy and recall, the number of training samples is reduced to 5 or 10; (c) ablation experiments are designed for each module, and the results show that more accurate prototypes can be obtained by using the dynamic routing algorithm.

References

1

Tian Y, Liao H, Xu J, Wang Y, Yuan S, Liu N. Unsupervised spectrum anomaly detection method for unauthorized bands. Space Sci Technol, 2022:9865016.

2

Min E, Long J, Liu Q, Cui J, Chen W. TR-IDS: Anomaly-based intrusion detection through text-convolutional neural network and random forest. Secur Commun Netw, 2018:4943509.

3

Liu R, Ren C, Fu M, Chu Z, Guo J. Platelet detection based on improved YOLO_v3. Cyborg Bionic Syst, 2022:9780569.

4

Injadat M, Moubayed A, Nassif AB, Shami A. Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans Netw Serv Manag, 2021,18(2):1803–1816.

5

Marir N, Wang H, Feng G, Li B, Jia M. Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark. IEEE Access, 2018(6):59657–59671.

6

Yulianto A, Sukarno P, Suwastika NA. Improving AdaBoost-based intrusion detection system (IDS) performance on CICIDS 2017 dataset. J Phys Conf Ser, 2019(1192):Article 012018.

7
Markel Z, Bilzor M. Building a machine learning classifier for malware detection, Proceedings of the 2014 Second Workshop on Anti-malware Testing Research (WATeR). Canterbury, UK: 23 October 2014:1–4.
8

Al-Yaseen WL, Othman ZA, Nazri MZA. Multi-level hybrid support vector machine and extreme learning machine based on modified k-means for intrusion detection system. Expert Syst Appl, 2017(67):296–303.

9

Liu J, Gao Y, Hu F. A fast network intrusion detection system using adaptive synthetic oversampling and lightgbm. Comput Secur, 2021(106):Article 102289.

10

Min B, Yoo J, Kim S, Shin D, Shin D. Network anomaly detection using memory-augmented deep autoencoder. IEEE Access, 2021(9):104695–104706.

11

Andresini G, Appice A, Malerba D. Nearest cluster-based intrusion detection through convolutional neural networks. Knowl-Based Syst, 2021(216):Article 106798.

12

Zheng F, Yan Q, Leung VC, Yu FR, Ming Z. HDP-CNN: Highway deep pyramid convolution neural network combining word-level and character-level representations for phishing website detection. Comput Secur, 2022(114):Article 102584.

13

Shi Z, Wang T, Huang Z, Xie F, Song G. A method for the automatic detection of myopia in optos fundus images based on deep learning. Int J Numer Methods Biomed Eng, 2021,37(6):Article e3460.

14

Pekta A, Acarman T. A deep learning method to detect network intrusion through flow-based features. Int J Netw Manag, 2019,29(3):e2050.

15

Kim J, Kim J, Kim H, Shim M, Choi E. Cnn-based network intrusion detection against denial-of-service attacks. Electronics, 2020,9(6):916.

16
Peng W, Kong X, Peng G, Li X, Wang Z. Network intrusion detection based on deep learning, Proceedings of the 2019 International Conference on Communications, Information System and Computer Engineering (CISCE). Haikou, China: 5–7 July 2019:431–435.
17

Imrana Y, Xiang Y, Ali L, Abdul-Rauf Z. A bidirectional lstm deep learning approach for intrusion detection. Expert Syst Appl, 2021(185):Article 115524.

18

Xu C, Shen J, Du X. A method of few-shot network intrusion detection based on meta-learning framework. IEEE Trans Inf Forensics Secur, 2020(15):3540–3552.

19
Vinyals O, Blundell C, Lillicrap T, Wierstra D. Matching networks for one shot learning. Proceedings of the 30th International Conference on Neural Information Processing System, December 2016:3637–3645.
20
Snell J, Swersky K, Zemel R. Prototypical networks for few-shot learning. Proceedings of the 31st International Conference on Neural Information Processing Systems, December 2017: 4080–4090. (ICCCS 2018); 27-30, 2018 Apr 27-30; Nagoya, Japan.
21
Sung F, Yang Y, Zhang L, Xiang T, Torr PH, Hospedales TM. Learning to compare: Relation network for few-shot learning. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. Salt Lake City, UT, USA: 18–23 June, 2018:1199–1208.
22
Geng R, Li B, Li Y, Zhu X, Jian P, Sun J. Induction networks for few-shot text classification. arXiv. 2019. https://doi.org/10.48550/arXiv.1902.10482.
23

Wang Z-M, Tian J-Y, Qin J, Fang H, Chen L-M. A few-shot learning-based siamese capsule network for intrusion detection with imbalanced training data. Comput Intell Neurosci, 2021(2021):7126913.

24

Ye T, Li G, Ahmad I, Zhang C, Lin X, Li J. FLAG: Few-shot latent dirichlet generative learning for semantic-aware traffic detection. IEEE Trans Netw Serv Manag, 2021,19(1):73–88.

25
Rong C, Gou G, Hou C, Li Z, Xiong G, Guo L, UMVD-FSL: Unseen malware variants detection using few-shot learning. Proceedings of the 2021 International Joint Conference on Neural Networks (IJCNN), Shenzhen, China: 18–22 July 2021, 1–8.
26
Guo J, Cui M, Hou C, Gou G, Li Z, Xiong G, Liu C. Global-aware prototypical network for few-shot encrypted traffic classification. Proceedings of the 2022 IFIP Networking Conference (IFIP Networking), Catania, Italy: 13–16 June, 2022:1–9.
27

Yang J, Li H, Shao S, Zou F, Wu Y. FS-IDS: A framework for intrusion detection based on few-shot learning. Comput Secur, 2022(122):Article 102899.

28

Yu Y, Bian N. An intrusion detection method using few-shot learning. IEEE Access, 2020(8):49730–49740.

29

Zhan G, Wang W, Sun H, Hou Y, Feng L. Auto-CSC: A transfer learning based automatic cell segmentation and count framework. Cyborg Bionic Syst, 2022:9842349.

30
Mikolov T, Chen K, Corrado G, Dean J, Efficient estimation of word representations in vector space. arXiv. 2013. https://doi.org/10.48550/arXiv.1301.3781.
31
Lin SZ, Shi Y, Xue Z. Character-level intrusion detection based on convolutional neural networks. Proceedings of the 2018 International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, Brazil: 8–13 July, 2018:1–8.
32

Bai D, Liu T, Han X, Yi H. Application research on optimization algorithm of sEMG Gesture recognition based on light CNN+LSTM model. Cyborg Bionic Syst, 2021:9794610.

33
Sharafaldin I, Lashkari AH, Ghorbani AA. Toward generating a new intrusion detection dataset and intrusion traffic characterization. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), 2018:108–116.
34

de Souza CA, Westphall CB, Machado RB, Sobral JBM, dos Santos Vieira G. Hybrid approach to intrusion detection in fog-based IoT environments. Comput Netw, 2020(180):Article 107417.

35
Rong X. word2vec parameter learning explained. arXiv. 2014. https://doi.org/10.48550/arXiv.1411.2738.
36
Faker O, Dogdu E. Intrusion detection using big data and deep learning techniques. Proceedings of the 2019 ACM Southeast Conference, April 2019:86–93.
37
Ahmim A, Maglaras L, Ferrag MA, Derdour M, Janicke H. A novel hierarchical intrusion detection system based on decision tree and rules-based models. Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), 29–31 May 2019, Santorini, Greece: 228–233.
38
Min E, Long J, Liu Q, Cui J, Cai Z, Ma J. SU-IDS: A semisupervised and unsupervised framework for network intrusion detection. Paper presented at: International Conference on Cloud Computing and Security, 2018.
39

van der Maaten L, Hinton G. Visualizing data using t-SNE. J Mach Learn Res, 2008,9(86):2579–2605.

40

Resende PAA, Drummond AC. Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling. Secur Priv, 2018,1(4):Article e36.

41

Zhang Y, Chen X, Jin L, Wang X, Guo D. Network intrusion detection: Based on deep hierarchical network and original flow data. IEEE Access, 2019(7):37004–37016.

42

Zhang X, Shenglin Y. Intrusion detection model of random attention capsule network based on variable fusion. J Commun, 2020,41(11):160.

Cyborg and Bionic Systems
Article number: 0086
Cite this article:
Ma Z, Chen Z, Zheng X, et al. A Biological Immunity-Based Neuro Prototype for Few-Shot Anomaly Detection with Character Embedding. Cyborg and Bionic Systems, 2024, 5: 0086. https://doi.org/10.34133/cbsystems.0086
Metrics & Citations  
Article History
Copyright
Rights and Permissions
Return