IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v15y2023i12p9395-d1168753.html
   My bibliography  Save this article

Applying Transfer Learning Approaches for Intrusion Detection in Software-Defined Networking

Author

Listed:
  • Hsiu-Min Chuang

    (Department of Information and Computer Engineering, Chung Yuan Christian University, Taoyuan City 320, Taiwan)

  • Li-Jyun Ye

    (Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan City 335, Taiwan)

Abstract

In traditional network management, the configuration of routing policies and associated settings on individual routers and switches was performed manually, incurring a considerable cost. By centralizing network management, software-defined networking (SDN) technology has reduced hardware construction costs and increased flexibility. However, this centralized architecture renders information security vulnerable to network attacks, making intrusion detection in the SDN environment crucial. Machine-learning approaches have been widely used for intrusion detection recently. However, critical issues such as unknown attacks, insufficient data, and class imbalance may significantly affect the performance of typical machine learning. We addressed these problems and proposed a transfer-learning method based on the SDN environment. The following experimental results showed that our method outperforms typical machine learning methods. (1) our model achieved a F1-score of 0.71 for anomaly detection for unknown attacks; (2) for small samples, our model achieved a F1-score of 0.98 for anomaly detection and a F1-score of 0.51 for attack types identification; (3) for class imbalance, our model achieved an F1-score of 1.00 for anomaly detection and 0.91 for attack type identification. In addition, our model required 15,230 seconds (4 h 13 m 50 s) for training, ranking second among the six models when considering both performance and efficiency. In future studies, we plan to combine sampling techniques with few-shot learning to improve the performance of minority classes in class imbalance scenarios.

Suggested Citation

  • Hsiu-Min Chuang & Li-Jyun Ye, 2023. "Applying Transfer Learning Approaches for Intrusion Detection in Software-Defined Networking," Sustainability, MDPI, vol. 15(12), pages 1-24, June.
  • Handle: RePEc:gam:jsusta:v:15:y:2023:i:12:p:9395-:d:1168753
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/15/12/9395/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/15/12/9395/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:15:y:2023:i:12:p:9395-:d:1168753. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.