A Meta-learning Approach for Few-shot Network Intrusion Detection Using Depthwise Separable Convolution
DOI:
https://doi.org/10.13052/jicts2245-800X.1245Keywords:
Network intrusion detection, meta-learning, depthwise separable convolution, few-shot learning, attack detectionAbstract
As cyberattacks become more frequent and sophisticated, network intrusion detection systems (IDS) play a critical role in safeguarding networks. However, traditional IDS models face challenges in detecting new, unseen attacks and typically require large volumes of labeled data for effective training. To address these issues, we propose a novel intrusion detection model based on meta-learning, integrating depthwise separable convolution (DSC). This model leverages few-shot learning to detect rare and emerging attack types with minimal labeled data. By using meta-learning, our model can rapidly adapt to new tasks, offering greater flexibility and scalability in various network scenarios. Experimental results on the CIC-DDoS2019 and CIC-IDS2017 datasets demonstrate that our model achieves competitive accuracy compared to state-of-the-art methods, even with fewer training samples. It also shows superior performance in terms of both detection accuracy and training efficiency, while being more resource-efficient, making it suitable for deployment in resource-constrained environments. In conclusion, our model offers a promising solution for network intrusion detection, enhancing the ability to detect new and emerging threats while ensuring computational efficiency for real-world applications.
Downloads
References
X. Fang, M. Xu, S. Xu, and P. Zhao, “A deep learning framework for predicting cyber attacks rates,” EURASIP Journal on Information security, vol. 2019, pp. 1–11, 2019.
J. Zhang, L. Pan, Q.-L. Han, C. Chen, S. Wen, and Y. Xiang, “Deep learning based attack detection for cyber-physical system cybersecurity: A survey,” IEEE/CAA Journal of Automatica Sinica, vol. 9, no. 3, pp. 377–391, 2021.
L. Ashiku and C. Dagli, “Network intrusion detection system using deep learning,” Procedia Computer Science, vol. 185, pp. 239–247, 2021.
D. Chou and M. Jiang, “A survey on data-driven network intrusion detection,” ACM Computing Surveys (CSUR), vol. 54, no. 9, pp. 1–36, 2021.
Z. Yang et al., “A systematic literature review of methods and datasets for anomaly-based network intrusion detection,” Computers & Security, vol. 116, p. 102675, 2022.
L. Zhang, J. Liu, Y. Wei, D. An, and X. Ning, “Self-supervised learning-based multi-source spectral fusion for fruit quality evaluation: A case study in mango fruit ripeness prediction,” Information Fusion, vol. 117, p. 102814, 2025.
T. Hospedales, A. Antoniou, P. Micaelli, and A. Storkey, “Meta-learning in neural networks: A survey,” IEEE transactions on pattern analysis and machine intelligence, vol. 44, no. 9, pp. 5149–5169, 2021.
C. Lu, X. Wang, A. Yang, Y. Liu, and Z. Dong, “A Few-Shot-Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things,” IEEE Internet of Things Journal, vol. 10, no. 24, pp. 21309–21321, 2023.
C. Xu, J. Shen, and X. Du, “A method of few-shot network intrusion detection based on meta-learning framework,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3540–3552, 2020.
F. Rustam, A. Raza, M. Qasim, S. K. Posa, and A. D. Jurcut, “A novel approach for real-time server-based attack detection using meta-learning,” IEEE Access, vol. 12, pp. 39614–39627, 2024.
A. Sohail, B. Ayisha, I. Hameed, M. M. Zafar, H. Alquhayz, and A. Khan, “Deep neural networks based meta-learning for network intrusion detection,” arXiv preprint arXiv:2302.09394, 2023.
Y. Xiao, C. Xing, T. Zhang, and Z. Zhao, “An intrusion detection model based on feature reduction and convolutional neural networks,” IEEE Access, vol. 7, pp. 42210–42219, 2019.
J. Huang, X. Yu, D. An, X. Ning, J. Liu, and P. Tiwari, “Uniformity and deformation: A benchmark for multi-fish real-time tracking in the farming,” Expert Systems with Applications, vol. 264, p. 125653, 2025.
Y. Fu, Y. Du, Z. Cao, Q. Li, and W. Xiang, “A deep learning model for network intrusion detection with imbalanced data,” Electronics, vol. 11, no. 6, p. 898, 2022.
D. Li, L. Deng, M. Lee, and H. Wang, “IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning,” International journal of information management, vol. 49, pp. 533–545, 2019.
H. Yang and F. Wang, “Wireless network intrusion detection based on improved convolutional neural network,” Ieee Access, vol. 7, pp. 64366–64374, 2019.
H. Xu and Y. Wang, “A continual few-shot learning method via meta-learning for intrusion detection,” in 2022 IEEE 4th International Conference on Civil Aviation Safety and Information Technology (ICCASIT), 2022: IEEE, pp. 1188–1194, doi: 10.1109/ICCASIT55263.2022.9986665.
X. Huang, S. Zhu, and Y. Ren, “A Semantic Matching Method of E-Government Information Resources Knowledge Fusion Service Driven by User Decisions,” Journal of Organizational & End User Computing, vol. 35, no. 1, 2023.
O. H. Abdulganiyu, T. Ait Tchakoucht, and Y. K. Saheed, “A systematic literature review for network intrusion detection system (IDS),” International journal of information security, vol. 22, no. 5, pp. 1125–1162, 2023.
Y. S. Almutairi, B. Alhazmi, and A. A. Munshi, “Network intrusion detection using machine learning techniques,” Advances in Science and Technology Research Journal, vol. 16, no. 3, pp. 193–206, 2022.
M. Li and W. Xiao, “Research on the Effect of E-Leadership on Employee Innovation Behavior in the Context of “Self” and “Relationship”,” Journal of Organizational & End User Computing, vol. 35, no. 1, 2023.
H. Choi, M. Kim, G. Lee, and W. Kim, “Unsupervised learning approach for network intrusion detection system using autoencoders,” The Journal of Supercomputing, vol. 75, pp. 5597–5621, 2019.
A. Drewek-Ossowicka, M. Pietrołaj, and J. Rumiński, “A survey of neural networks usage for intrusion detection systems,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 1, pp. 497–514, 2021.
K. He, D. D. Kim, and M. R. Asghar, “Adversarial machine learning for network intrusion detection systems: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 538–566, 2023.
M. J. Idrissi et al., “Fed-anids: Federated learning for anomaly-based network intrusion detection systems,” Expert Systems with Applications, vol. 234, p. 121000, 2023.
L. A. Nguyen, I. Miciæ, N.-T. Nguyen, and S. Stanimiroviæ, “Depth-Bounded Fuzzy Bisimulation for Fuzzy Modal Logic,” Cybernetics and Systems, pp. 1–18, 2023.
T. Rupa Devi and S. Badugu, “A review on network intrusion detection system using machine learning,” in International Conference on E-Business and Telecommunications, 2019: Springer, pp. 598–607.
A. Shenfield, D. Day, and A. Ayesh, “Intelligent intrusion detection systems using artificial neural networks,” Ict Express, vol. 4, no. 2, pp. 95–99, 2018.
E. Suwannalai and C. Polprasert, “Network intrusion detection systems using adversarial reinforcement learning with deep Q-network,” in 2020 18th International Conference on ICT and Knowledge Engineering (ICT&KE), 2020: IEEE, pp. 1–7.
A. Aruna Kumari, A. Bhagat, and S. Kumar Henge, “Classification of Diabetic Retinopathy Severity Using Deep Learning Techniques on Retinal Images,” Cybernetics and Systems, pp. 1–25, 2024.
K. Fan, W. Zhang, G. Liu, and H. He, “FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems,” Cybersecurity, vol. 6, no. 1, p. 35, 2023.
M. Kim, “ML/CGAN: Network attack analysis using CGAN as meta-learning,” IEEE Communications Letters, vol. 25, no. 2, pp. 499–502, 2020.
M. Sannidhan, J. E. Martis, R. S. Nayak, S. K. Aithal, and K. Sudeepa, “Detection of antibiotic constituent in Aspergillus flavus using quantum convolutional neural network,” International Journal of E-Health and Medical Communications (IJEHMC), vol. 14, no. 1, pp. 1–26, 2023.
F. Liu, M. Li, X. Liu, T. Xue, J. Ren, and C. Zhang, “A review of federated meta-learning and its application in cyberspace security,” Electronics, vol. 12, no. 15, p. 3295, 2023.
M. Rafiei, M. Maheri, and H. R. Rabiee, “Privacy Challenges in Meta-Learning: An Investigation on Model-Agnostic Meta-Learning,” arXiv preprint arXiv:2406.00249, 2024.
Z. Wang, M. Li, H. Ou, S. Pang, and Z. Yue, “A Few-Shot Malicious Encrypted Traffic Detection Approach Based on Model-Agnostic Meta-Learning,” Security and Communication Networks, vol. 2023, no. 1, p. 3629831, 2023.
A. Kodipalli, S. L. Fernandes, S. K. Dasar, and T. Ismail, “Computational framework of inverted fuzzy C-means and quantum convolutional neural network towards accurate detection of ovarian tumors,” International Journal of E-Health and Medical Communications (IJEHMC), vol. 14, no. 1, pp. 1–16, 2023.
Y. Zhou et al., “Optimization of automated garbage recognition model based on resnet-50 and weakly supervised cnn for sustainable urban development,” Alexandria Engineering Journal, vol. 108, pp. 415–427, 2024.
Z. Wan, “A Meta-Learning based IDS,” Purdue University Graduate School, 2024.
A. Yang et al., “Application of meta-learning in cyberspace security: A survey,” Digital Communications and Networks, vol. 9, no. 1, pp. 67–78, 2023.
J. Zhao, Q. Li, Y. Hong, and M. Shen, “MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning,” IEEE Transactions on Network and Service Management, vol. 21, no. 2, pp. 2460–2476, 2024.
U. Zukaib, X. Cui, C. Zheng, D. Liang, and S. U. Din, “Meta-Fed IDS: Meta-Learning and Federated Learning Based Fog-Cloud Approach to Detect Known and Zero-Day Cyber Attacks in IoMT Networks,” Journal of Parallel and Distributed Computing, vol. 192, p. 104934, 2024.
S. Wang, R. Jiang, Z. Wang, and Y. Zhou, “Deep learning-based anomaly detection and log analysis for computer networks,” arXiv preprint arXiv:2407.05639, 2024.
I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, “Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy,” in 2019 international carnahan conference on security technology (ICCST), 2019: IEEE, pp. 1–8, doi: 10.1109/CCST.2019.8888419.
I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization,” ICISSp, vol. 1, pp. 108–116, 2018.
H. Jia, J. Liu, M. Zhang, X. He, and W. Sun, “Network intrusion detection based on IE-DBN model,” Computer Communications, vol. 178, pp. 131–140, 2021.
A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi, and R. Ahmad, “CNN-LSTM: hybrid deep neural network for network intrusion detection system,” IEEE Access, vol. 10, pp. 99837–99849, 2022.
D. Liang and P. Pan, “Research on intrusion detection based on improved DBN-ELM,” in 2019 international conference on communications, information system and computer engineering (CISCE), 2019: IEEE, pp. 495–499, doi: 10.1109/CISCE.2019.00115.
Y. Wu et al., “MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework,” IEEE Internet of Things Journal, vol. 11, pp. 25136–25146, 2024, doi: 10.1109/JIOT.2024.3395629.
S. Wang, W. Xu, and Y. Liu, “Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things,” Computer Networks, vol. 235, p. 109982, 2023.




