A Meta-learning Approach for Few-shot Network Intrusion Detection Using Depthwise Separable Convolution

Authors

  • Guo Li College of Intelligent Manufacturing and Electrical Engineering, Nanyang Normal University, Nanyang, Henan 473000, China
  • MingHua Wang Shandong Gete Aviation Technology Co., Ltd, Jinan, ShanDong 250000, China

DOI:

https://doi.org/10.13052/jicts2245-800X.1245

Keywords:

Network intrusion detection, meta-learning, depthwise separable convolution, few-shot learning, attack detection

Abstract

As cyberattacks become more frequent and sophisticated, network intrusion detection systems (IDS) play a critical role in safeguarding networks. However, traditional IDS models face challenges in detecting new, unseen attacks and typically require large volumes of labeled data for effective training. To address these issues, we propose a novel intrusion detection model based on meta-learning, integrating depthwise separable convolution (DSC). This model leverages few-shot learning to detect rare and emerging attack types with minimal labeled data. By using meta-learning, our model can rapidly adapt to new tasks, offering greater flexibility and scalability in various network scenarios. Experimental results on the CIC-DDoS2019 and CIC-IDS2017 datasets demonstrate that our model achieves competitive accuracy compared to state-of-the-art methods, even with fewer training samples. It also shows superior performance in terms of both detection accuracy and training efficiency, while being more resource-efficient, making it suitable for deployment in resource-constrained environments. In conclusion, our model offers a promising solution for network intrusion detection, enhancing the ability to detect new and emerging threats while ensuring computational efficiency for real-world applications.

Downloads

Download data is not yet available.

Author Biographies

Guo Li, College of Intelligent Manufacturing and Electrical Engineering, Nanyang Normal University, Nanyang, Henan 473000, China

Guo Li was born in Henan, China, in 1980. From 1999 to 2009, he studied at Airforce Engineering University and received his bachelor’s degree in 2003. He received his Master’s degree in 2006 and his Doctor’s degree in 2009. Currently, he works in Nanyang Normal University. He has published ten papers, five of which has been indexed by SCI and EI. His research interests are included intelligent information processing and loT.

MingHua Wang, Shandong Gete Aviation Technology Co., Ltd, Jinan, ShanDong 250000, China

MingHua Wang was born in Anhui, China, in 1974. From 1992 to 1996, he studied at Air Force Telecommunications Engineering College and received his bachelor’s degree in 1996. From 2005 to 2007, he studied in ShanDong University and received his Master’s degree in 2007. Currently, he works in Shandong Gete Aviation Technology Co., Ltd. His research interests include flight information processing and IoT.

References

X. Fang, M. Xu, S. Xu, and P. Zhao, “A deep learning framework for predicting cyber attacks rates,” EURASIP Journal on Information security, vol. 2019, pp. 1–11, 2019.

J. Zhang, L. Pan, Q.-L. Han, C. Chen, S. Wen, and Y. Xiang, “Deep learning based attack detection for cyber-physical system cybersecurity: A survey,” IEEE/CAA Journal of Automatica Sinica, vol. 9, no. 3, pp. 377–391, 2021.

L. Ashiku and C. Dagli, “Network intrusion detection system using deep learning,” Procedia Computer Science, vol. 185, pp. 239–247, 2021.

D. Chou and M. Jiang, “A survey on data-driven network intrusion detection,” ACM Computing Surveys (CSUR), vol. 54, no. 9, pp. 1–36, 2021.

Z. Yang et al., “A systematic literature review of methods and datasets for anomaly-based network intrusion detection,” Computers & Security, vol. 116, p. 102675, 2022.

L. Zhang, J. Liu, Y. Wei, D. An, and X. Ning, “Self-supervised learning-based multi-source spectral fusion for fruit quality evaluation: A case study in mango fruit ripeness prediction,” Information Fusion, vol. 117, p. 102814, 2025.

T. Hospedales, A. Antoniou, P. Micaelli, and A. Storkey, “Meta-learning in neural networks: A survey,” IEEE transactions on pattern analysis and machine intelligence, vol. 44, no. 9, pp. 5149–5169, 2021.

C. Lu, X. Wang, A. Yang, Y. Liu, and Z. Dong, “A Few-Shot-Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things,” IEEE Internet of Things Journal, vol. 10, no. 24, pp. 21309–21321, 2023.

C. Xu, J. Shen, and X. Du, “A method of few-shot network intrusion detection based on meta-learning framework,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3540–3552, 2020.

F. Rustam, A. Raza, M. Qasim, S. K. Posa, and A. D. Jurcut, “A novel approach for real-time server-based attack detection using meta-learning,” IEEE Access, vol. 12, pp. 39614–39627, 2024.

A. Sohail, B. Ayisha, I. Hameed, M. M. Zafar, H. Alquhayz, and A. Khan, “Deep neural networks based meta-learning for network intrusion detection,” arXiv preprint arXiv:2302.09394, 2023.

Y. Xiao, C. Xing, T. Zhang, and Z. Zhao, “An intrusion detection model based on feature reduction and convolutional neural networks,” IEEE Access, vol. 7, pp. 42210–42219, 2019.

J. Huang, X. Yu, D. An, X. Ning, J. Liu, and P. Tiwari, “Uniformity and deformation: A benchmark for multi-fish real-time tracking in the farming,” Expert Systems with Applications, vol. 264, p. 125653, 2025.

Y. Fu, Y. Du, Z. Cao, Q. Li, and W. Xiang, “A deep learning model for network intrusion detection with imbalanced data,” Electronics, vol. 11, no. 6, p. 898, 2022.

D. Li, L. Deng, M. Lee, and H. Wang, “IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning,” International journal of information management, vol. 49, pp. 533–545, 2019.

H. Yang and F. Wang, “Wireless network intrusion detection based on improved convolutional neural network,” Ieee Access, vol. 7, pp. 64366–64374, 2019.

H. Xu and Y. Wang, “A continual few-shot learning method via meta-learning for intrusion detection,” in 2022 IEEE 4th International Conference on Civil Aviation Safety and Information Technology (ICCASIT), 2022: IEEE, pp. 1188–1194, doi: 10.1109/ICCASIT55263.2022.9986665.

X. Huang, S. Zhu, and Y. Ren, “A Semantic Matching Method of E-Government Information Resources Knowledge Fusion Service Driven by User Decisions,” Journal of Organizational & End User Computing, vol. 35, no. 1, 2023.

O. H. Abdulganiyu, T. Ait Tchakoucht, and Y. K. Saheed, “A systematic literature review for network intrusion detection system (IDS),” International journal of information security, vol. 22, no. 5, pp. 1125–1162, 2023.

Y. S. Almutairi, B. Alhazmi, and A. A. Munshi, “Network intrusion detection using machine learning techniques,” Advances in Science and Technology Research Journal, vol. 16, no. 3, pp. 193–206, 2022.

M. Li and W. Xiao, “Research on the Effect of E-Leadership on Employee Innovation Behavior in the Context of “Self” and “Relationship”,” Journal of Organizational & End User Computing, vol. 35, no. 1, 2023.

H. Choi, M. Kim, G. Lee, and W. Kim, “Unsupervised learning approach for network intrusion detection system using autoencoders,” The Journal of Supercomputing, vol. 75, pp. 5597–5621, 2019.

A. Drewek-Ossowicka, M. Pietrołaj, and J. Rumiński, “A survey of neural networks usage for intrusion detection systems,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 1, pp. 497–514, 2021.

K. He, D. D. Kim, and M. R. Asghar, “Adversarial machine learning for network intrusion detection systems: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 538–566, 2023.

M. J. Idrissi et al., “Fed-anids: Federated learning for anomaly-based network intrusion detection systems,” Expert Systems with Applications, vol. 234, p. 121000, 2023.

L. A. Nguyen, I. Miciæ, N.-T. Nguyen, and S. Stanimiroviæ, “Depth-Bounded Fuzzy Bisimulation for Fuzzy Modal Logic,” Cybernetics and Systems, pp. 1–18, 2023.

T. Rupa Devi and S. Badugu, “A review on network intrusion detection system using machine learning,” in International Conference on E-Business and Telecommunications, 2019: Springer, pp. 598–607.

A. Shenfield, D. Day, and A. Ayesh, “Intelligent intrusion detection systems using artificial neural networks,” Ict Express, vol. 4, no. 2, pp. 95–99, 2018.

E. Suwannalai and C. Polprasert, “Network intrusion detection systems using adversarial reinforcement learning with deep Q-network,” in 2020 18th International Conference on ICT and Knowledge Engineering (ICT&KE), 2020: IEEE, pp. 1–7.

A. Aruna Kumari, A. Bhagat, and S. Kumar Henge, “Classification of Diabetic Retinopathy Severity Using Deep Learning Techniques on Retinal Images,” Cybernetics and Systems, pp. 1–25, 2024.

K. Fan, W. Zhang, G. Liu, and H. He, “FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems,” Cybersecurity, vol. 6, no. 1, p. 35, 2023.

M. Kim, “ML/CGAN: Network attack analysis using CGAN as meta-learning,” IEEE Communications Letters, vol. 25, no. 2, pp. 499–502, 2020.

M. Sannidhan, J. E. Martis, R. S. Nayak, S. K. Aithal, and K. Sudeepa, “Detection of antibiotic constituent in Aspergillus flavus using quantum convolutional neural network,” International Journal of E-Health and Medical Communications (IJEHMC), vol. 14, no. 1, pp. 1–26, 2023.

F. Liu, M. Li, X. Liu, T. Xue, J. Ren, and C. Zhang, “A review of federated meta-learning and its application in cyberspace security,” Electronics, vol. 12, no. 15, p. 3295, 2023.

M. Rafiei, M. Maheri, and H. R. Rabiee, “Privacy Challenges in Meta-Learning: An Investigation on Model-Agnostic Meta-Learning,” arXiv preprint arXiv:2406.00249, 2024.

Z. Wang, M. Li, H. Ou, S. Pang, and Z. Yue, “A Few-Shot Malicious Encrypted Traffic Detection Approach Based on Model-Agnostic Meta-Learning,” Security and Communication Networks, vol. 2023, no. 1, p. 3629831, 2023.

A. Kodipalli, S. L. Fernandes, S. K. Dasar, and T. Ismail, “Computational framework of inverted fuzzy C-means and quantum convolutional neural network towards accurate detection of ovarian tumors,” International Journal of E-Health and Medical Communications (IJEHMC), vol. 14, no. 1, pp. 1–16, 2023.

Y. Zhou et al., “Optimization of automated garbage recognition model based on resnet-50 and weakly supervised cnn for sustainable urban development,” Alexandria Engineering Journal, vol. 108, pp. 415–427, 2024.

Z. Wan, “A Meta-Learning based IDS,” Purdue University Graduate School, 2024.

A. Yang et al., “Application of meta-learning in cyberspace security: A survey,” Digital Communications and Networks, vol. 9, no. 1, pp. 67–78, 2023.

J. Zhao, Q. Li, Y. Hong, and M. Shen, “MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning,” IEEE Transactions on Network and Service Management, vol. 21, no. 2, pp. 2460–2476, 2024.

U. Zukaib, X. Cui, C. Zheng, D. Liang, and S. U. Din, “Meta-Fed IDS: Meta-Learning and Federated Learning Based Fog-Cloud Approach to Detect Known and Zero-Day Cyber Attacks in IoMT Networks,” Journal of Parallel and Distributed Computing, vol. 192, p. 104934, 2024.

S. Wang, R. Jiang, Z. Wang, and Y. Zhou, “Deep learning-based anomaly detection and log analysis for computer networks,” arXiv preprint arXiv:2407.05639, 2024.

I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, “Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy,” in 2019 international carnahan conference on security technology (ICCST), 2019: IEEE, pp. 1–8, doi: 10.1109/CCST.2019.8888419.

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization,” ICISSp, vol. 1, pp. 108–116, 2018.

H. Jia, J. Liu, M. Zhang, X. He, and W. Sun, “Network intrusion detection based on IE-DBN model,” Computer Communications, vol. 178, pp. 131–140, 2021.

A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi, and R. Ahmad, “CNN-LSTM: hybrid deep neural network for network intrusion detection system,” IEEE Access, vol. 10, pp. 99837–99849, 2022.

D. Liang and P. Pan, “Research on intrusion detection based on improved DBN-ELM,” in 2019 international conference on communications, information system and computer engineering (CISCE), 2019: IEEE, pp. 495–499, doi: 10.1109/CISCE.2019.00115.

Y. Wu et al., “MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework,” IEEE Internet of Things Journal, vol. 11, pp. 25136–25146, 2024, doi: 10.1109/JIOT.2024.3395629.

S. Wang, W. Xu, and Y. Liu, “Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things,” Computer Networks, vol. 235, p. 109982, 2023.

Downloads

Published

2025-03-10

How to Cite

Li, G. ., & Wang, M. . (2025). A Meta-learning Approach for Few-shot Network Intrusion Detection Using Depthwise Separable Convolution. Journal of ICT Standardization, 12(04), 443–470. https://doi.org/10.13052/jicts2245-800X.1245

Issue

Section

Intelligent System Concepts, architecture, standards, tools and applications