Supervised contrastive learning over prototype-label embeddings for network intrusion detection

نویسندگان

چکیده

Contrastive learning makes it possible to establish similarities between samples by comparing their distances in an intermediate representation space (embedding space) and using loss functions designed attract/repel similar/dissimilar samples. The distance comparison is based exclusively on the sample features. We propose a novel contrastive scheme including labels same embedding as features performing this shared space. Following idea, should be close its ground-truth (positive) label away from other (negative labels). This allows implement supervised classification learning. Each embedded will assume role of class prototype space, with that share gathering around it. aim separate prototypes while minimizing each same-class A set proposed objective. Loss minimization drive allocation associated training prediction architectures are analyzed detail, along different strategies for separation. drastically reduces number pair-wise comparisons, thus improving model performance. In order further reduce initial extended replacing negative best single representative: either nearest or centroid cluster labels. idea creates new subset models which detail. outputs (in prototypes. These can used perform (minimum label), dimensionality reduction (using embeddings instead original features) data visualization (with 2 3D embeddings). Although generic, application performance evaluation done here network intrusion detection, characterized noisy unbalanced challenging various types attacks. Empirical results applied detection presented detail two well-known datasets, thorough clustering metrics included.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection: Supervised Machine Learning

Due to the expansion of high-speed Internet access, the need for secure and reliable networks has become more critical. The sophistication of network attacks, as well as their severity, has also increased recently. As such, more and more organizations are becoming vulnerable to attack. The aim of this research is to classify network attacks using neural networks (NN), which leads to a higher de...

متن کامل

Learning Intrusion Detection: Supervised or Unsupervised?

Application and development of specialized machine learning techniques is gaining increasing attention in the intrusion detection community. A variety of learning techniques proposed for different intrusion detection problems can be roughly classified into two broad categories: supervised (classification) and unsupervised (anomaly detection and clustering). In this contribution we develop an ex...

متن کامل

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

TCM-KNN Algorithm for Supervised Network Intrusion Detection

As network attacks have increased in number and severity over the past few years, intrusion detection is increasingly becoming a critical component of secure information systems and supervised network intrusion detection has been an active and difficult research topic in the field of intrusion detection for many years. However, it hasn’t been widely applied in practice due to some inherent issu...

متن کامل

Semi-supervised Random Forest for Intrusion Detection Network

In order to protect valuable computer systems, network data needs to be analyzed and classified so that possible network intrusions can be detected. Machine learning techniques have been used to classify network data. For supervised machine learning methods, they can achieve high accuracy at classifying network data as normal or malicious, but they require the availability of fully labeled data...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Fusion

سال: 2022

ISSN: ['1566-2535', '1872-6305']

DOI: https://doi.org/10.1016/j.inffus.2021.09.014