Transfer Learning Based Intrusion Detect
Transfer Learning Based Intrusion Detect
Article
Transfer-Learning-Based Intrusion Detection Framework in
IoT Networks
Eva Rodríguez * , Pol Valls, Beatriz Otero, Juan José Costa , Javier Verdú , Manuel Alejandro Pajuelo
and Ramon Canal
Abstract: Cyberattacks in the Internet of Things (IoT) are growing exponentially, especially zero-day
attacks mostly driven by security weaknesses on IoT networks. Traditional intrusion detection
systems (IDSs) adopted machine learning (ML), especially deep Learning (DL), to improve the
detection of cyberattacks. DL-based IDSs require balanced datasets with large amounts of labeled
data; however, there is a lack of such large collections in IoT networks. This paper proposes an
efficient intrusion detection framework based on transfer learning (TL), knowledge transfer, and
model refinement, for the effective detection of zero-day attacks. The framework is tailored to 5G
IoT scenarios with unbalanced and scarce labeled datasets. The TL model is based on convolutional
neural networks (CNNs). The framework was evaluated to detect a wide range of zero-day attacks.
To this end, three specialized datasets were created. Experimental results show that the proposed
TL-based framework achieves high accuracy and low false prediction rate (FPR). The proposed
solution has better detection rates for the different families of known and zero-day attacks than any
Citation: Rodríguez, E.; Valls, P.; previous DL-based IDS. These results demonstrate that TL is effective in the detection of cyberattacks
Otero, B.; Costa, J.J.; Verdú, J.; Pajuelo, in IoT environments.
M.A.; Canal, R. Transfer-Learning
-Based Intrusion Detection
Keywords: cybersecurity; convolutional neural network; intrusion detection systems; IoT networks;
Framework in IoT Networks. Sensors
transfer learning
2022, 22, 5621. https://doi.org/
10.3390/s22155621
that are different from normal behavior, increasing detection accuracy and reducing the
false positives [5,6].
DL-based IDSs have demonstrated their capabilities to extract complex patterns when
a large collection of labeled data is available to train the classification models in order to
detect intrusions. However, in IoT environments, there is a lack of such large collection of
labeled data for unknown (zero-day) attacks, or even for known families of attacks. In these
networks, new training data are expensive and time-consuming to collect, or occasionally
nonexistent. Moreover, when a new intrusion is detected, DL models must be retrained
with the new data from scratch, involving a huge amount of computing resources and time.
Thus, DL-based IDSs are suffering the challenges of IoT networks where datasets are scarce
and unbalanced, and devices have limited computing capabilities.
The emergence of transfer learning (TL) [7] helps IDSs overcome their limitations
in the detection of zero-day attacks, evolving threats, and in the effective detection of
cyberattacks in networks with scarce and unbalanced datasets. TL is a recent ML progress,
which applies in a target domain the knowledge previously learned in a related source
domain. TL creates a high-performance learner for the target domain trained from the
related source domain. TL has been demonstrated to be effective in the areas of natural
language processing (NLP) [8] and computer vision (CV) [9]. Image classification models
trained to detect different categories of objects are repurposed for a new, different, but
related, domain. Transferring the knowledge gives better results than training the new
image dataset from scratch. Research works demonstrate that the performance of a model
built using TL is similar to that obtained by DL models even if the TL works with only
one to ten percent of the labeled training data. Recently, TL has been explored in IDSs. It
improves the detection of known attacks in domains with scarce data, such as IoT networks,
and in the detection of zero-day attacks. The results are promising in the detection accuracy
of new intrusions. Existing research works use TL to improve the detection of known
attacks in scarce datasets; to speed up the training process; and to detect zero-day attacks.
In some cases, they are focused on the detection of a specific new family of novel attacks or
on a specific IoT application, such as Internet of Vehicles (IoV). Thus, this paper overcomes
existing work defining a novel effective framework for the detection of different families of
known and novel attacks based on TL in IoT networks.
The goal of this work is to define and implement an efficient intrusion detection
framework based on TL, knowledge transfer, and model refinement. We evaluate detection
rate and accuracy for known and novel cyberattack families in IoT networks with scarce
and unbalanced datasets. The deep transfer learning solution developed is based on
convolutional neural networks (CNNs). Two different, but related, datasets in intrusion
detection are considered, containing normal and cyberattack traffic flows in the IoT domain.
The BoT-IoT dataset [10] is chosen for the source domain, since it is a large dataset with IoT
network traffic, and the UNSW-NB15 dataset [11] is chosen for the target domain, since it is
a scarce labeled dataset with IoT network traffic that comprises modern and contemporary
cyberattacks. The main contributions of this work are summarized as follows:
• First, we propose a novel framework for the detection of known and zero-day attacks
in IoT networks, based on TL and network fine-tuning.
• Second, we propose the creation of three specialized datasets to train and evaluate the
framework: (i) the UNSW-NB15-Basic, with normal traffic and four different types
of known attacks; (ii) the UNSW-NB15-Test+, with normal traffic and five different
types of zero-day attacks; and (iii) the UNSW-NB15-Test, with normal traffic and nine
different types of attacks (four known and five zero-day attacks).
The proposed TL-based attack detection framework outperforms the state of the art
by achieving an overall accuracy of 97.89% and 0.05% FPR, while detection rates for the
different families of zero-day attacks range from 98.85% to 100%. The proposed framework
considers IoT network traffic, such as provided in the UNSW-NB15 dataset; it does not
consider real data from IoT networks.
Sensors 2022, 22, 5621 3 of 17
The rest of this article is organized as follows. Section 2 discusses the related work
on transfer-learning-based solutions for cyberattack detection in IoT networks. Section 3
provides the background used in our work. Section 4 presents the proposed TL-based
intrusion detection framework. Sections 5 and 6 describe the usage of the framework in IoT
networks and discuss the performance evaluation results. Section 7 concludes the paper
and outlines the future work.
2. Related Work
DL has been widely applied to network intrusion detection. However, currently
available datasets in IoT environments are, in most cases, inadequate to train systems
capable of detecting unknown intrusions. Transfer learning has been proposed to overcome
low-level intrusion detection rates. Initial works in this area propose the use of TL [7] by
means of CNN models in a two-stage learning process: first, learning from a base dataset,
the UNSW-NB15 [11], and then transferring the knowledge of the learning process to the
target dataset, the NSL-KDD dataset [12]. The system considers two concatenated CNNs,
and it is evaluated using the KDDTest-21 dataset for considering zero-day attacks. They
achieve an improvement of about 2.86% in the detection of novel attacks compared to
the traditional CNN mode. They achieve an accuracy (ACC) of 81.94%. In the same vein,
Masum et al. [13] explore transfer learning for the detection of novel intrusions. Their
solution is also based on a two-step process, but in this case, the first step uses the VGG-16
pretrained on ImageNet dataset, and in the second, a deep neural network (DNN) is applied
to the extracted features. The DNN consists of an input layer, two hidden layers, and an
output layer. The hidden layers are fully connected layers with 64 and 8 nodes, respectively.
They evaluate the solution also using the NSL-KDD dataset, achieving an accuracy of
70.97% in the detection of novel intrusions (KDDTest-21), slightly lower than [7].
Sameera et al. [14] use transfer learning in IDS to detect zero-day attacks minimizing
FPR, but restrict the solution to the detection of remote-to-local (R2L) attacks. The system
that they propose detects unlabeled R2L attacks of the NSL-KDD dataset making use of
labeled DoS attacks. They achieve an accuracy of 89.79% and FPR of 0.15%, improving
previous feature-based TL methods [15] by 11.79%. Similarly, Singla et al. [16] propose
a system for detecting specific families of novel attacks transferring knowledge from a
source domain to a target model with limited training data. They implement the TL model
using two DNN with two and five regular densely connected layers. They break down the
UNSW-NB15 dataset [11] into two parts: (i) a source dataset containing different categories
of attacks, and (ii) a target dataset containing just a new attack type. The accuracy of the
TL solution improves between 3.2% and 19.1%, depending on the type of new attack. The
baseline is the DL model trained from scratch. In the IoV, Li et al. [17] propose the usage of
TL for updating training models when a new attack is produced and the IoV cloud cannot
provide the labeled data in time. Then, multiple TL is performed using the pseudo-labeled
data. The experiments use two datasets of the public dataset AWID [18] and they achieve
96% detection accuracy, improving traditional schemes up to 8%. In the same area, but
with a different objective, to speed up the training process, Mehedi et al. [19] propose a
deep-TL-based ID model to classify normal traffic and attacks. The TL model makes use of
two CNNs and the datasets used for the source and target domain are two different subsets
of the new-generation labeled dataset for in-vehicle network [20], which considers three
different types of attacks: flooding, fuzzing, and spoofing. The detection model shows
optimal performance with an overall accuracy of 98.1%.
Fan et al. [21] bring together transfer and federated learning in 5G IoT environments.
They propose a federated framework to securely enable data aggregation from different IoT
networks. They use transfer learning to achieve a personalized intrusion detection model
for each IoT network. They implement transfer learning using CNN, and they evaluate the
solution with the CICIDS2017 [22] as base dataset and different custom target datasets for
the different IoT networks. They achieve a detection accuracy of 91.93% on average.
Sensors 2022, 22, 5621 4 of 17
Idrissi et al. [23] also propose the usage of transfer learning to overcome the limitation
of traditional DL-based IDS on the detection of novel attacks in IoT environments with
few labeled data. Their solution retrains a fine-tuned pretrained model where most of the
layers are fixed and just the last ones are trained using a CNN. They consider the BoT-IoT
dataset [10], generic for IoT systems, in the source domain, and update it in the target
domain with small data from the TON-IoT dataset [24], specific for Industrial IoT (IIoT).
They achieve an accuracy of 99% in the detection of novel attacks.
Finally, deep transfer learning (DTL) is used for intrusion detection in scarce datasets,
but not considering zero-day attacks. Guan et al. [25] benefit from the work carried out in
traffic classification [26] to develop a method based on deep transfer learning for network
classification in IoT environments with scarce labeled data with devices with limited
computing capability. They make use of EfficientNet [27] and Big Transfer (BiT) [28], which
have demonstrated excellent performance for transfer learning in image recognition. They
evaluate the solution using the 10% USTC-TFC2016 labeled dataset [29]. The proposal
achieves an accuracy of 96.22% and 96.40% for BiT and EfficientNet, respectively. Table 1
summarizes the works reviewed in this section. Mehedi et al. [30] propose a residual neural
network based on DTL to effectively detect intrusions in heterogeneous IoT networks.
They construct its own dataset from various heterogeneous sources, which include seven
IoT sensors, and they detect nine different types of attacks: DoS, DDoS, data injection,
man-in-the-middle (MITM), backdoor, password cracking attack (PCA), scanning, cross-site
scripting (XSS), and ransomware. The overall accuracy of the CNN-based model is 87%.
The work proposed in this paper differentiates from those reviewed, as some of them
propose the usage of TL to improve the detection of known attacks in scarce datasets [25],
heterogeneous IoT networks [30], or personalizing the solution for different IoT net-
works [21], but without considering novel attacks. While others are restricted to specific
families of novel attacks [14,16,23] use datasets not specific to IoT environments [7,13], or
focus their solution on a specific IoT environment [19]. Finally, [17] has a different objective,
to speed up the training process.
3. Background
3.1. Convolutional Neural Networks
CNNs [31], also known as ConvNets, are one of the most popular DNNs. CNNs were
first used for the recognition of phonemes and words [32]. Later, CNNs were applied to
image classification [33]. CNNs have been recently considered in the cybersecurity field
for intrusion detection [34] and encrypted traffic classification [35]. The architecture of a
CNN (see Figure 1) consists of three different types of layers: convolutional, pooling, and
classification. Convolutional layers are the core of the CNN, where its units are organized
in feature maps. Each unit in a feature map is connected to the local patches in the feature
maps of the previous layer through a set of weights (filter bank). The result of applying
Sensors 2022, 22, 5621 5 of 17
these filters goes through a nonlinearity transformation. The role of the pooling layers is
to merge semantically similar features into a single one by applying a specific function.
Pooling layers reduce the size of the feature maps and the number of overfitting parameters.
The classifiers are usually formed by fully connected layers. The classification is performed
based on the detected features. Recently, different pretrained models used in TL are based
on CNNs [36], since the lower layers of the convolutional base of the CNN are used for
general features, while the higher layers are used for specialized features.
fix the convolutional base and use its outputs to feed the classifier. It is used for small
datasets or when solving really similar problems. The later approach is the chosen one in
our framework since we have a small dataset without observations for the zero-day attacks
and the source and target domain deal with the same problem, the detection of intrusions
in IoT networks.
5. Evaluation
This section proposes a possible application of the TL-based ID framework in IoT
environments. We choose two datasets for the source and transfer domain that contain
normal and cyberattack IoT traffic flows. For the source domain, we require a large IoT
network activity dataset, then we choose the the BoT-IoT dataset [10], while for the target
domain, we choose a scarce, unbalanced dataset with IoT network traffic that comprises
modern and contemporary cyberattacks, the UNSW-NB15 [11] dataset. To evaluate the
detection of zero-day attacks, we created four different datasets, as explained below.
UNSW-NB15-Basic-Train UNSW-NB15-Basic-Test
Name Records Percentage Records Percentage
Normal 217,552 49.95% 72,794 50.14%
Generic 161,865 37.17% 53,616 36.93%
Exploits 33,408 7.67% 11,117 7.66%
DoS 12,196 2.80% 4157 2.86%
Reconnaissance 10,498 2.41% 3489 2.40%
UNSW-NB15-Test+ UNSW-NB15-Test
Name Records Percentage Records Percentage
Normal 30,937 50.00% 321,283 50.00%
Generic - - 215,481 33.53%
Exploits - - 44,525 6.93%
DoS - - 16,353 2.54%
Reconnaissance - - 13,987 2.18%
Fuzzers 24,246 39.19% 24,246 3.77%
Analysis 2677 4.33% 2677 0.42%
Backdoor 2329 3.76% 2329 0.36%
Shellcode 1511 2.44% 1511 0.24%
Worms 174 0.28% 174 0.03%
For the source domain, we use 10% of the BoT-IoT dataset, randomly split into 75%
for training and 25% for testing. Table 6 details the datasets created in terms of normal and
malicious traffic. Note that the distribution of attacks is different for the UNSW-NB15-Test+
and UNSW-NB15-Test, since the former only considers zero-day attacks, while the latter
considers known and zero-day attacks.
Table 6. Dataset summary showing the number of records corresponding to normal and malicious
traffic, the corresponding percentage of attacks, and the percentage of novel attacks.
6. Results
6.1. Metrics
To evaluate the TL-based cyberattacks detection solution, we consider accuracy, preci-
sion, recall, FPR, and F1-score metrics. These metrics use properties from a confusion matrix,
i.e., the matrix representation of the classification results, where true positive (TP) and true
negative (TN) denote the number of attack and normal records correctly classified, whereas
false positive (FP) and false negative (FN) denote the number of normal and attack records
incorrectly classified.
Accuracy (ACC) is the ratio of correctly classified predictions over the total number of
instances evaluated.
TP + TN
ACC = (1)
TP + TN + FP + FN
Sensors 2022, 22, 5621 12 of 17
Precision (p) is the ratio of items correctly classified from the total of items predicted.
TP
p= (2)
TP + FP
Recall (r) is the ratio of items correctly classified from the total of corrected items.
TP
r= (3)
TP + FN
False prediction rate (FPR) represents the ratio of items incorrectly classified (attack
or normal).
FP
FPR = (4)
TN + FP
F1-score is the weighted harmonic mean of precision and recall.
2 ∗ ( p ∗ r)
F1-score = (5)
p+r
6.1.2. Training
The proposed framework is pretrained using the BoT-IoT dataset (source domain).
The CNN-B is trained with 25 epochs, a batch-size of 2048, and the Adam optimizer has a
learning rate of 5 × 10−4 to minimize the error function. We also use a categorical cross-
entropy loss function. The CNN-TL is trained using the UNSW-NB15-Basic-Train dataset
(target domain). The training consists of 15 epochs, a batch size of 4096, an Adam optimizer
with a learning rate of 2 × 10−5 , and categorical cross-entropy loss function. The learning
rate used is very small to achieve a better performance of TL. The training parameters for
both models are summarized in Table 9.
6.1.3. Validation
The TL solution is tested using the UNSW-NB15-Test+ dataset (which only comprises
zero-day attacks) and the UNSW-NB15-Test (which comprises both known and zero-
day attacks).
First, to validate the efficiency of the TL model in the detection of zero-day attacks, we
evaluate the model using the UNSW-NB15-Test+ dataset. The model achieves a 99.04% ac-
curacy, 99.06% precision, 99.04% recall, 0.05% FPR, and 99.05% F1-score. Table 10 presents
the number of detected samples—TP + TN, non-detected samples—FP + FN, and the de-
tection rate for the five different types of zero-day attacks, showing that the DR exceeds 98%
in all cases.
Sensors 2022, 22, 5621 13 of 17
The TL model is also evaluated on the detection of known and zero-day attacks. To
this end, the UNSW-NB15-Test dataset is used for testing. The CNN-TL model achieves a
97.89% accuracy, 98.22% precision, 97.89% recall, 0.05% FPR, and 97.97% F1-score. Although
the model statistics are slightly lower than when only considering zero-day attacks, the
detection rate for the different families of zero-day attacks is also greater than 98%, as
shown in Table 11.
Table 11. Attack detection summary UNSW-NB15 dataset: Known and zero-day attacks.
known and zero-day. The DR achieved for the different families of zero-day attacks remains
practically the same when only considering zero-day attacks, or when also considering
known attacks, ranging from 98.85% to 100%. When compared with the CNN-based IDS,
the TL-based framework improves DR for zero-day attacks up to 33.28%, and up to 7.1%
for known attacks. Therefore, the TL-based IDS significantly improves the detection of
zero-day and known attacks with less representation in the dataset, when compared with
the CNN-based IDS.
Table 12. Attack detection rate for known and zero-day attacks.
UNSW-NB15-Test UNSW-NB15-Test+
Traffic CNN TL Improvement CNN TL Improvement
Normal 99.65% 98.54% -1.11% 98.52% 98.34% -0.18%
DoS 96.73% 99.43% 2.7 0% - - -
Exploits 97.90% 99.76% 1.86% - - -
Generic 99.16% 99.98% 0.82% - - -
Reconnaissance 92.85% 99.95% 7.10% - - -
Analysis 86.14% 99.84% 13.7% 66.72% 100.00% 33.28%
Backdoor 83.62% 99.44% 15.82% 89.64% 100.00% 16.38%
Fuzzers 80.76% 99.79% 19.03% 69.20% 99.95% 30.75%
Shellcode 89.43% 99.93% 10.50% 98.34% 99.93% 1.59%
Worms 96.31% 98.85% 2.54% 95.97% 98.85% 2.88%
Author Contributions: Conceptualization, E.R. and B.O.; methodology, E.R., P.V., J.J.C. and M.A.P.;
software, E.R., P.V. and J.V.; validation, E.R., P.V., R.C. and J.V.; investigation, E.R., B.O. and M.A.P.;
writing—review and editing, E.R., P.V., B.O., J.J.C., J.V., M.A.P. and R.C.; project administration, R.C.
and M.A.P.; funding acquisition, R.C. and M.A.P. All authors have read and agreed to the published
version of the manuscript.
Funding: This work was supported partially by the Generalitat de Catalunya under Grant 2017SGR962,
and partially by the DRAC Project under Grant 001-P-001723.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: The TL-based IDS framework is available at the GitHub repository
github.com/polvalls9/Transfer-Learning-Based-Intrusion-Detection-in-5G-and-IoT-Networks.
Conflicts of Interest: The authors declare no conflict of interest.
Sensors 2022, 22, 5621 15 of 17
Abbreviations
The following abbreviations are used in this manuscript:
ACC Accuracy
ACCS Australian Center for Cyber Security
BiT Big Transfer
CNN Convolutional Neural Network
CV Computer Vision
DDoS Distributed Denial of Service
DoS Denial of Service
DL Deep Learning
DNN Deep Neural Network
DR Detection Rate
FN False Negative
FP False Positive
FPR False Prediction Rate
HTTP Hypertext Transfer Protocol
ID Intrusion Detection
IDS Intrusion Detection System
IoT Internet of Things
IoV Internet of vehicles
MITM Man-in-the-Middle
ML Machine Learning
NLP Natural Language Processing
p Precision
r Recall
R2L Remote-to-Local
TCP Transfer Control Protocol
TL Transfer Learning
TN True Negative
TP True Positive
UDP Datagram Protocol
XSS Cross-Site Scripting
References
1. Internet Security Report. Available online: https://www.watchguard.com/wgrd-resource-center/security-report-q3-2020
(accessed on 27 May 2022).
2. Alladi, T.; Chamola, V.; Sikdar, B.; Choo, K. Consumer IoT: Security Vulnerability Case Studies and Solutions. IEEE Consum.
Electron. Mag. 2020, 2, 17–25. [CrossRef]
3. Kilincer, I.; Ertam, F.; Sengur, A. Machine learning methods for cyber security intrusion detection: Datasets and comparative
study. Comput. Netw. 2021, 188, 107840. [CrossRef]
4. Fadlullah, Z.M.; Tang, F.; Mao, B.; Kato, N.; Akashi, O.; Inoue, T.; Mizutani, K. State-of-the-art deep learning: Evolving machine
intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Commun. Surv. Tutor. 2017, 19, 2432-–2455.
[CrossRef]
5. Thamilarasu, G.; Chawla, S. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things. Sensors 2019, 19, 1977.
[CrossRef]
6. Rodríguez, E.; Otero, B.; Gutiérrez, N.; Canal, R. A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks.
IEEE Commun. Surv. Tutor. 2021, 23, 1920–1955. [CrossRef]
7. Wu, P.; Guo, H.; Buckland, R. A Transfer Learning Approach for Network Intrusion Detection. In Proceedings of the IEEE 4th
International Conference on Big Data Analytics ICBDA, Suzhou, China, 15 March 2019; pp. 281–285.
8. Ruder, S.; Peters, M.; Swayamdipta, S.; Wolf, T. A Transfer Learning in Natural Language Processing Tutorial. In Proceedings of
the 2019 Conference of the North American Chapter of the Association for Computational Linguistics, Minneapolis, Minnesota, 1
June 2019; pp. 15–19.
9. Kasthurirangan, G.; Khaitan, S.; Choudhary, A.; Agrawal, A. Deep Convolutional Neural Networks with transfer learning for
computer vision-based data-driven pavement distress detection. Constr. Build Mater. 2017, 157, 322–330.
10. BoT IoT Dataset. Available online: https://research.unsw.edu.au/projects/bot-iot-dataset (accessed on 27 May 2022).
Sensors 2022, 22, 5621 16 of 17
11. Moustafa, N.; Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network
data set). In Proceedings of the Military Communications and Information Systems Conference MilCIS, Canberra, Australia, 10
November 2015; pp. 1–6.
12. NSL-KDD. Available online: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed on 27 May 2022).
13. Masum, M.; Shahriar, H. TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection. In Proceedings
of the 15th International Conference for Internet Technology and Secured Transactions ICITST, London, UK, 8 December 2020;
pp. 1–7.
14. Sameera, N.; Shashi, M. Transfer Learning Based Prototype for Zero-Day Attack Detection. Int. J. Eng. Adv. Technol. 2019,
8, 1326–1329.
15. Zhao, J.; Shetty, S.; Pan, J.W. Feature-based transfer learning for network security. In Proceedings of the IEEE Military Communi-
cations Conference MILCOM, Baltimore, MD, USA, 23 October 2017; pp. 17–22.
16. Singla, A.; Bertino, E.; Verma, D. Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer
Learning. In Proceedings of the IEEE International Conference on Smart Computing SMARTCOMP, Washington, DC, USA, 12
June 2019; pp. 69–74.
17. Li, X.; Hu, Z.; Xu, M.; Wang, Y.; Ma, J. Transfer learning based intrusion detection scheme for Internet of vehicles. Inf. Sci. 2021,
547, 119–135. [CrossRef]
18. Kolias, C.; Kambourakis, G.; Stavrou, A.; Gritzalis, S. Intrusion detection in 802.11 networks: Empirical evaluation of threats and
a public dataset. IEEE Commun. Surv. Tutor. 2015, 18, 184–208. [CrossRef]
19. Mehedi, S. T.; Anwar, A.; Rahman, Z.; Ahmed, K. Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular
Networks. Sensors 2021, 21, 4736. [CrossRef]
20. Kang, H.; Kwak, B.; Lee, Y.H.; Lee, H.; Lee, H.; Kim, H.K. Car Hacking: Attack and Defense Challenge 2020 Dataset. IEEE
Dataport 2021. Available online: https://ieee-dataport.org/open-access/car-hacking-attack-defense-challenge-2020-dataset
(accessed on 27 May 2022).
21. Fan, Y.; Li, Y.; Zhan, M.; Cui, H.; Zhang, Y. IoTDefender: A Federated Transfer Learning Intrusion Detection Framework for 5G
IoT. In Proceedings of the IEEE 14th International Conference on Big Data Science and Engineering BigDataSE, Guangzhou,
China, 1 January 2021; pp. 88–95.
22. Sharafaldin, I.; Habibi Lashkari, A.; Ghorbani, A.A. New Intrusion Detection Dataset and Intrusion Traffic Characterization.
In Proceedings of the 4th International Conference on Information Systems Security and Privacy ICISSP, Funchal, Portugal, 24
January 2018; pp. 108–116.
23. Idrissi, I.; Azizi, M.; Moussaoui, O. Accelerating the update of a DL-based IDS for IoT using deep transfer learning. Indones. J.
Electr. Eng. Comput. Sci. 2021, 23, 1059–1067. [CrossRef]
24. ToN IoT Dataset. Available online: https://research.unsw.edu.au/projects/toniot-datasets (accessed on 27 May 2022).
25. Guan, J.; Cai, J.; Bai, H. Deep transfer learning-based network traffic classification for scarce dataset in 5G IoT systems. Int. J.
Mach. Learn. Cyber 2021, 12, 3351–3365. [CrossRef]
26. Sun, G.; Liang, L.; Chen, T.; Xiao, F.; Lang, F. Network traffic classification based on transfer learning. Comput. Electr. Eng. 2018,
69, 920–927. [CrossRef]
27. Tan, M.; Le, Q. EfficientNet: Rethinking model scaling for convolutional neural networks. In Proceedings of the 36th International
Conference on Machine Learning PMLR, Long Beach, CA, USA, 15 June 2019; pp. 6105–6114.
28. Kolesnikov, A.; Beyer, L.; Zhai, X.; Puigcerver, J.; Yung, J.; Gelly, S.; Houlsby, N. Big Transfer (BiT): General visual representation
learning. In Proceedings of the European Conference on Computer Vision ECCV, Glasgow, UK, 28 August 2020; pp. 491–507.
29. USTC-TFC2016. Available online: https://github.com/yungshenglu/USTC-TFC2016/ (accessed on 27 May 2022).
30. Mehedi, S.T.; Anwar, A.; Rahman, Z.; Ahmed, K.; Islam, R. Dependable Intrusion Detection System for IoT: A Deep Transfer
Learning-based Approach. IEEE Trans. Ind. Inf. 2022, 1, 1–12. [CrossRef]
31. LeCun, Y.; Bengio, Y. Convolutional networks for images, speech, and time series. In The Handbook of Brain Theory and Neural
Networks; Arbib, M.A., Ed.; MIT Press: Cambridge, MA, USA, 1998; pp. 255–258.
32. Waibel, A.; Hanazawa, T.; Hinton, G.; Shikano, K.; Lang, K.J. Phoneme recognition using time-delay neural networks. IEEE Trans.
Acoust. Speech Lang. Process. 1989, 37, 328–339. [CrossRef]
33. Krizhevsky, A.; Sutskever, I.; Hinton, G.E. ImageNet classification with deep convolutional neural networks. Adv. Neural Inf.
Process. Syst. 2012, 25, 1097–1105. [CrossRef]
34. Roopak, M.; Tian, G.Y.; Chambers, J. Deep learning models for cyber security in IoT networks. In Proceedings of the 9th IEEE
Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7 January 2019; pp. 452–457.
35. Lotfollahi, M.; Jafari Siavoshani, M.; Shirali Hossein Zade, R.; Saberian, M. Deep packet a novel approach for encrypted traffic
classification using deep learning. Soft. Comput. 2019, 24, 1–14. [CrossRef]
36. Krishna, S.T.; Kalluri, H.K. Deep Learning and Transfer Learning Approaches for Image Classification. Int. J. Recent Technol. Eng.
2019, 7, 427–432.
37. Zhuang, F.; Qi, Z.; Duan, K.; Xi, D.; Zhu, Y.; Zhu, H.; Xiong, H.; He, Q. A Comprehensive Survey on Transfer Learning. Proc. IEEE
2021, 109, 43–76. [CrossRef]
38. Pan, S.J.; Yang, Q. A Survey on Transfer Learning. IEEE Trans. Knowl. Data Eng. 2010, 22, 1345–1359. [CrossRef]
Sensors 2022, 22, 5621 17 of 17
39. Tan, C.; Sun, F.; Kong, T.; Zhang, W.; Yang, C.; Liu, C. A Survey on Deep Transfer Learning. In Proceedings of the Artificial Neural
Networks and Machine Learning (ICANN), Rhodes, Greece, 4 October 2018; pp. 270–279.
40. Yosinski, J.; Clune, J.; Bengio, Y.; Lipson, H. How transferable are features in deep neural networks? Adv. Neural Inf. Process. Syst.
2014, 27, 1–9.
41. TensorFlow. Available online: https://www.tensorflow.org/ (accessed on 27 May 2022).
42. Keras: The Python Deep Learning Library. Available online: https://keras.io/ (accessed on 27 May 2022).
43. TL-Based IDS Framework GitHub Repository. Available online: http://github.com/polvalls9/Transfer-Learning-Based-
Intrusion-Detection-in-5G-and-IoT-Networks (accessed on 27 May 2022).