Transfer Learning Technique: An Approach For Network Intrusion Detection

Umejuru Daniel, Vivian Onyinyechi Anthony

Abstract


Transfer learning (TL) is a machine learning technique that applies knowledge gained from solving one problem to solve a different but related problem. TL reduces the effort and time required to solve a problem by using a pre-trained model on a similar problem. Recently, network intrusion detection systems have incorporated both traditional and deep learning techniques. The goal of these systems is to detect network attacks and violations of rules. Although machine learning introduces novel attack surfaces that fascinate researchers, it also challenges the development of novel models, input definitions, and ML-IDS training. This research investigates the application of transfer learning as a technique for network intrusion detection. The proposed IDS system is capable of detecting multiple threat levels in the networking field. The system uses two pre-trained convolutional neural networks (CNNs) from the perspective of knowledge transfer, combining their predictions into a single model. The pre-trained CNNs on a related problem are adapted for a new but similar problem. The models were trained and tested using transfer learning to detect both common and uncommon attack patterns. The NSL-KDD dataset from Kaggle was employed to test the network intrusion detection system. The experimental results demonstrate that our TL technique has a prediction accuracy of 96.52%, which is a remarkable level of efficiency as expected. We therefore recommend the application of transfer learning, which has greatly contributed to the development of deep learning and is essential in developing efficient network intrusion detection systems

Keywords


Intrusion, Detection, Attack, Transfer learning, Network

Full Text:

PDF

References


Abayomi-Alli, A. A., Ikuomola, A. I., Robert, I. S. and Abayomi-Alli, O. O.(2025) An Enterprise Cloud-Based Electronic Health Records System, Journal of Computer Science and Information Technology, 2(2), 21-36.

Butun Ismail(2023)., “Prevention and Detection of Intrusions in Wireless Sensor Networks”, Scholar Commons: 15

Diogenes, Y. and Ozkaya,E. (2023) Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, in Cybersecurity – Attack and Defense Strategies, 2nd Editio., Packt Publishing Ltd., 2-30

Hosna, A., Merry, E., Gyalmo, J., Alom, Z., Aung, Z. and Azim, M. A.(2022), Transfer learning: a friendly introduction, Hosna et al. Journal of Big Data, 1-19

Kim, D. H., & MacKinnon, T. (2018). Artificial intelligence in fracture detection: transfer learning from deep convolutional neural networks. Clinical radiology, 73(5), 439-445

Neog, et al (2020). , Data Mining Techniques for (Network) Intrusion Detection Systems: 1

Solanki, S., Gupta, C. and Rai, K.(2023), A Survey on Machine Learning based Intrusion Detection System on NSLKDD Dataset, International Journal of Computer Applications, 176(20), 121- 128.

Stosic L. (2022), “Computer Security and security technmologies”, Research Gate: 25.

Surantha N. and Wicaksono W. (2020), An IoT based House Intruder Detection and Alert System using Histogram of Oriented Gradients”, Journal of Computer Science, 31(41), 1101-1121

Tan, Z. Jamdagni, X. He, X. Nanda, P. and Liu, R. P. (2024), A system for denial-of-service attack detection based on multivariate correlation analysis, IEEE Transactions on Parallel and Distributed Systems, 25, 447–456.

Tsiakmaki, M., Kostopoulos, G., Kotsiantis, S., & Ragos, O. (2020). Transfer learning from deep neural networks for predicting student performance. Applied Sciences, 10(6), 2145.

Vadhil, F. A., Salihi, M. L. and Nanne, M. F.(2024), Machine learning-based intrusion detection system for detecting web attacks, IAES International Journal of Artificial Intelligence (IJ-AI), 13(1), 711~721

Usha D. And Suganthi S. (2023), A Survey of Intrusion Detection System in IoT Devices,

International Journal of Advanced Research (IJAR): 23, 12-23.

Wang K. and Stolfo S., (2023), “Anomalous Payload-based Network Intrusion Detection”:12-23




DOI: http://dx.doi.org/10.52155/ijpsat.v56.2.7974

Refbacks

  • There are currently no refbacks.


Copyright (c) 2026 Umejuru Daniel, Vivian Onyinyechi Anthony

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.