PF-TL: Payload Feature-Based Transfer Learning for Dealing with the Lack of Training Data
- Authors
- Jung, Ilok; Lim, Jongin; Kim, Huy Kang
- Issue Date
- 5월-2021
- Publisher
- MDPI
- Keywords
- knowledge transfer; intrusion detection; machine learning; payloads; transfer learning
- Citation
- ELECTRONICS, v.10, no.10
- Indexed
- SCIE
SCOPUS
- Journal Title
- ELECTRONICS
- Volume
- 10
- Number
- 10
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/128145
- DOI
- 10.3390/electronics10101148
- ISSN
- 2079-9292
- Abstract
- The number of studies on applying machine learning to cyber security has increased over the past few years. These studies, however, are facing difficulties with making themselves usable in the real world, mainly due to the lack of training data and reusability of a created model. While transfer learning seems like a solution to these problems, the number of studies in the field of intrusion detection is still insufficient. Therefore, this study proposes payload feature-based transfer learning as a solution to the lack of training data when applying machine learning to intrusion detection by using the knowledge from an already known domain. Firstly, it expands the extracting range of information from header to payload to accurately deliver the information by using an effective hybrid feature extraction method. Secondly, this study provides an improved optimization method for the extracted features to create a labeled dataset for a target domain. This proposal was validated on publicly available datasets, using three distinctive scenarios, and the results confirmed its usability in practice by increasing the accuracy of the training data created from the transfer learning by 30%, compared to that of the non-transfer learning method. In addition, we showed that this approach can help in identifying previously unknown attacks and reusing models from different domains.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.