Transfer Learning for Network Security

Title Transfer Learning for Network Security
Summary Study of Transfer Learning techniques in Network Security applications- Network Traffic Classification and Intrusion Detection
Keywords Transfer Learning, Domain Adaptation, Traffic Classification, Intrusion Detection
References Li D, Yuan Q, Li T, Chen S, Yang J. Cross-domain Network Traffic Classification Using Unsupervised Domain Adaptation. In2020 International Conference on Information Networking (ICOIN) 2020 Jan 7 (pp. 245-250). IEEE.

Sun G, Liang L, Chen T, Xiao F, Lang F. Network traffic classification based on transfer learning. Computers & electrical engineering. 2018 Jul 1;69:920-7.

Taghiyarrenani Z, Fanian A, Mahdavi E, Mirzaei A, Farsi H. Transfer learning based intrusion detection. In2018 8th International Conference on Computer and Knowledge Engineering (ICCKE) 2018 Oct 25 (pp. 92-97). IEEE.

Supervisor Slawomir Nowaczyk, Zahra Taghiyarrenani
Level Master
Status Open

These days, utilization of Transfer Learning and more specifically Domain Adaptation is increasingly getting researchers' attention specifically for solving real-world problems. Network security applications including intrusion detection and network traffic classification can also make a profit from this technique.

As a general definition, transfer learning methods extract knowledge from one domain(Source) and employ them for solving the problem in another domain(Target). The definition of the domain depends on the problem to be solved. Particularly, in the network field, we can refer to each separate network as a domain. So, using Transfer Learning, it would be possible to use the available(labeled) samples from one network to train a learning model in another network. Despite the fact that there are many developed transfer learning methods, the utilization of that in the network security fields is not investigated enough yet.

The main objective of this work is 1)to study the challenges behind the use of the Transfer learning in network security applications 2) to study the different transfer learning techniques including instance_based, feature_based, and model_based methods that can be applied in this field, and finally 3) develop a new transfer learning method for this field.