Transfer Learning for Security: Challenges and Future Directions (2403.00935v1)
Abstract: Many machine learning and data mining algorithms rely on the assumption that the training and testing data share the same feature space and distribution. However, this assumption may not always hold. For instance, there are situations where we need to classify data in one domain, but we only have sufficient training data available from a different domain. The latter data may follow a distinct distribution. In such cases, successfully transferring knowledge across domains can significantly improve learning performance and reduce the need for extensive data labeling efforts. Transfer learning (TL) has thus emerged as a promising framework to tackle this challenge, particularly in security-related tasks. This paper aims to review the current advancements in utilizing TL techniques for security. The paper includes a discussion of the existing research gaps in applying TL in the security domain, as well as exploring potential future research directions and issues that arise in the context of TL-assisted security solutions.
- Polisma-a framework for learning attribute-based access control policies. In Computer Security–ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I 25, pages 523–544. Springer, 2020.
- Flap-a federated learning framework for attribute-based access control policies. In Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, pages 263–272, 2023.
- Machine Learning Techniques for Cybersecurity. Springer Nature, 2023.
- Learning to learn sequential network attacks using hidden markov models. IEEE Access, 8:134480–134497, 2020.
- Diffusion models in vision: A survey. arXiv preprint arXiv:2209.04747, 2022.
- Imagenet: A large-scale hierarchical image database. In 2009 IEEE conference on computer vision and pattern recognition, pages 248–255. Ieee, 2009.
- Neural audio synthesis of musical notes with wavenet autoencoders. In International Conference on Machine Learning, pages 1068–1077. PMLR, 2017.
- Domain-adversarial training of neural networks. The journal of machine learning research, 17(1):2096–2030, 2016.
- Generative adversarial networks. Communications of the ACM, 63(11):139–144, 2020.
- Cascaded diffusion models for high fidelity image generation. J. Mach. Learn. Res., 23(47):1–33, 2022.
- Measuring expertise and bias in cyber security using cognitive and neuroscience approaches. In 2013 IEEE International Conference on Intelligence and Security Informatics, pages 364–367. IEEE, 2013.
- Sanjeev Kumar and B Janet. Dtmic: Deep transfer learning for malware image classification. Journal of Information Security and Applications, 64:103063, 2022.
- Sushil Kumar et al. Mcft-cnn: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in internet of things. Future Generation Computer Systems, 125:334–351, 2021.
- Cognitive biases in cyber decision-making. In Proceedings of the 13th International Conference on Cyber Warfare and Security, page 395, 2018.
- Maximal domain independent representations improve transfer learning. arXiv preprint arXiv:2306.00262, 2023a.
- Building manufacturing deep learning models with minimal and imbalanced training data using domain adaptation and data augmentation. In 2023 IEEE International Conference on Industrial Technology (ICIT), pages 1–8. IEEE, 2023b.
- Diagnosing rotating machines with weakly supervised data using deep transfer learning. IEEE transactions on industrial informatics, 16(3):1688–1697, 2019.
- An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert systems with applications, 39(1):424–430, 2012.
- Cann: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-based systems, 78:13–21, 2015.
- Idsgan: Generative adversarial networks for attack generation against intrusion detection. arXiv preprint arXiv:1809.02077, 2018.
- Goshawk: Hunting memory corruptions via structure-aware and object-centric memory operation synopsis. In 2022 IEEE Symposium on Security and Privacy (SP), pages 2096–2113. IEEE, 2022.
- The natural language decathlon: Multitask learning as question answering. arXiv preprint arXiv:1806.08730, 2018.
- Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv preprint arXiv:1802.09089, 2018.
- E-spion: A system-level intrusion detection system for iot devices. In Proceedings of the 2019 ACM Asia conference on computer and communications security, pages 493–500, 2019.
- Deep generative models: Survey. In 2018 International conference on intelligent systems and computer vision (ISCV), pages 1–8. IEEE, 2018.
- A survey on transfer learning. IEEE Transactions on knowledge and data engineering, 22(10):1345–1359, 2009.
- Open set domain adaptation. In Proceedings of the IEEE international conference on computer vision, pages 754–763, 2017.
- Xda: Accurate, robust disassembly with transfer learning. arXiv preprint arXiv:2010.00770, 2020.
- Federated adversarial domain adaptation. arXiv preprint arXiv:1911.02054, 2019.
- Sim-to-real transfer of robotic control with dynamics randomization. In IEEE international conference on robotics and automation (ICRA), pages 3803–3810. IEEE, 2018.
- Improving language understanding by generative pre-training. 2018.
- Not all bytes are equal: Neural byte sieve for fuzzing. arXiv preprint arXiv:1711.04596, 2017.
- A framework for fairness: A systematic review of existing fair ai solutions. arXiv preprint arXiv:2112.05700, 2021.
- Malware detection using image representation of malware data and transfer learning. Journal of Parallel and Distributed Computing, 172:32–50, 2023.
- Decision trees for mining data streams based on the gaussian approximation. IEEE Transactions on Knowledge and Data Engineering, 26(1):108–119, 2013.
- Improved techniques for training gans. Advances in neural information processing systems, 29, 2016.
- Transfer learning for visual categorization: A survey. IEEE transactions on neural networks and learning systems, 26(5):1019–1034, 2014.
- Highly accurate machine fault diagnosis using deep transfer learning. IEEE Transactions on Industrial Informatics, 15(4):2446–2455, 2018.
- Dp-ada: Differentially private adversarial domain adaptation for training deep learning based network intrusion detection systems. In 2022 IEEE 8th International Conference on Collaboration and Internet Computing (CIC), pages 89–98. IEEE, 2022.
- Overcoming the lack of labeled data: Training intrusion detection models using transfer learning. In 2019 IEEE International Conference on Smart Computing (SMARTCOMP), pages 69–74. IEEE, 2019.
- Preparing network intrusion detection deep learning models with minimal data using adversarial domain adaptation. In Proceedings of the 15th ACM Asia conference on computer and communications security, pages 127–140, 2020.
- Deep transfer learning based on sparse autoencoder for remaining useful life prediction of tool in manufacturing. IEEE transactions on industrial informatics, 15(4):2416–2425, 2018.
- Zerowall: Detecting zero-day web attacks through encoder-decoder recurrent neural networks. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pages 2479–2488. IEEE, 2020.
- Real-time sensor anomaly detection and identification in automated vehicles. IEEE Transactions on Intelligent Transportation Systems, 21(3):1264–1276, 2019.
- Distributed framework for detecting pmu data manipulation attacks with deep autoencoders. IEEE Transactions on smart grid, 10(4):4401–4410, 2018.
- Deep visual domain adaptation: A survey. Neurocomputing, 312:135–153, 2018.
- Reinforcement and transfer learning for distributed analytics in fragmented software defined coalitions. In Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications III, volume 11746, pages 442–452. SPIE, 2021.
- Multiple source domain adaptation with adversarial learning. 2018.
- Transfer learning for detecting unknown network attacks. EURASIP Journal on Information Security, 2019:1–13, 2019.