Skip to main content

Learning to Transfer Knowledge Between Datasets to Enhance Intrusion Detection Systems

  • Conference paper
  • First Online:
Computational Intelligence

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 968))

Abstract

Software-defined network (SDN) is a technology that is being used widely to reduce the time and effort required for programming network functions. However, by splitting the control layer and data layer, the SDN architecture also attracts numerous types of attacks such as spoofing or information disclosure. In the recent years, a few research articles coped with the security problem by introducing open datasets and classification techniques to detect the attacks to SDN. The state-of-the-art techniques perform very well in a single cross-validation dataset, i.e., in the situation, the training and the evaluation datasets are being withdrawn from the same source. However, their performance reduces significantly in the presence of concept drift, i.e., if the testing dataset is collected from a different source than the observed dataset. In this research study, we address this cross-dataset predictive issue by several concept drift detection techniques. The experimental results let us claim that our presented models can improve the performance in the cross-dataset scenario.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alavizadeh H, Jang-Jaccard J, Alavizadeh H (2021) Deep q-learning based reinforcement learning approach for network intrusion detection. arXiv preprint arXiv:2111.13978

  2. Dang QV (2019) Studying machine learning techniques for intrusion detection systems. In: FDSE. Lecture notes in computer science, vol 11814. Springer, pp 411–426

    Google Scholar 

  3. Dang QV (2020) Active learning for intrusion detection systems. In: IEEE RIVF

    Google Scholar 

  4. Dang QV (2020) Understanding the decision of machine learning based intrusion detection systems. In: FDSE. Lecture notes in computer science, vol 12466. Springer, pp 379–396

    Google Scholar 

  5. Dang QV (2021) Improving the performance of the intrusion detection systems by the machine learning explain ability. Int J Web Inf Syst

    Google Scholar 

  6. Dang QV (2021) Intrusion detection in software-defined networks. In: FDSE. Lecture notes in computer science. Springer

    Google Scholar 

  7. Dang QV (2021) Studying the fuzzy clustering algorithm for intrusion detection on the attacks to the domain name system. In: WorldS4. IEEE

    Google Scholar 

  8. Dang QV (2022) Detecting intrusion using multiple datasets in software-defined networks. In: International conference on research in computational intelligence and communication networks (ICRCICN). Springer

    Google Scholar 

  9. Dang QV, Vo TH (2021) Reinforcement learning for the problem of detecting intrusion in a computer system. In: Proceedings of ICICT

    Google Scholar 

  10. Data M, Aritsugi M (2021) T-dfnn: An incremental learning algorithm for intrusion detection systems. IEEE Access

    Google Scholar 

  11. Elsayed MS, Le-Khac NA, Jurcut AD (2020) InSDN: a novel SDN intrusion dataset. IEEE Access 8:165263–165284

    Article  Google Scholar 

  12. Jaw E, Wang X (2021) Feature selection and ensemble-based intrusion detection system: an efficient and comprehensive approach. Symmetry 13(10):1764

    Article  Google Scholar 

  13. Liu FT, Ting KM, Zhou ZH (2008) Isolation forest. In: 2008 8th IEEE international conference on data mining. IEEE, pp 413–422

    Google Scholar 

  14. Maseer ZK, Yusof R, Bahaman N, Mostafa SA, Foozy CFM (2021) Benchmarking of machine learning for anomaly based intrusion detection systems in the cicids2017 dataset. IEEE Access 9:22351–22370

    Article  Google Scholar 

  15. Prabakaran S, Ramar R, Hussain I, Kavin BP, Alshamrani SS, AlGhamdi AS, Alshehri A (2022) Predicting attack pattern via machine learning by exploiting stateful firewall as virtual network function in an SDN network. Sensors 22(3):709

    Article  Google Scholar 

  16. Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp 108–116

    Google Scholar 

  17. Thakkar A, Lohiya R (2020) A review of the advancement in intrusion detection datasets. Procedia Comput Sci 167:636–645

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quang-Vinh Dang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dang, QV. (2023). Learning to Transfer Knowledge Between Datasets to Enhance Intrusion Detection Systems. In: Shukla, A., Murthy, B.K., Hasteer, N., Van Belle, JP. (eds) Computational Intelligence. Lecture Notes in Electrical Engineering, vol 968. Springer, Singapore. https://doi.org/10.1007/978-981-19-7346-8_4

Download citation

Publish with us

Policies and ethics