ArXiv TLDR

Robust Semi-Supervised Temporal Intrusion Detection for Adversarial Cloud Networks

🐦 Tweet
2604.12655

Anasuya Chattopadhyay, Daniel Reti, Hans D. Schotten

cs.LGcs.CR

TLDR

A robust semi-supervised temporal framework enhances cloud intrusion detection by addressing limited labels, non-stationary traffic, and adaptive adversaries.

Key contributions

  • Proposes a robust semi-supervised temporal learning framework for cloud intrusion detection.
  • Combines supervised learning with consistency regularization and confidence-aware pseudo-labeling.
  • Addresses adversarial contamination and temporal drift in unlabeled network traffic.
  • Leverages temporal structure of network flows for improved robustness and generalization.

Why it matters

Cloud networks need robust intrusion detection systems, but current methods struggle with limited labels, non-stationary traffic, and adaptive adversaries. This paper offers a novel semi-supervised framework that effectively addresses these real-world challenges, significantly improving detection performance and resilience.

Original Abstract

Cloud networks increasingly rely on machine learning based Network Intrusion Detection Systems to defend against evolving cyber threats. However, real-world deployments are challenged by limited labeled data, non-stationary traffic, and adaptive adversaries. While semi-supervised learning can alleviate label scarcity, most existing approaches implicitly assume benign and stationary unlabeled traffic, leading to degraded performance in adversarial cloud environments. This paper proposes a robust semi-supervised temporal learning framework for cloud intrusion detection that explicitly addresses adversarial contamination and temporal drift in unlabeled network traffic. Operating on flow-level data, this framework combines supervised learning with consistency regularization, confidence-aware pseudo-labeling, and selective temporal invariance to conservatively exploit unlabeled traffic while suppressing unreliable samples. By leveraging the temporal structure of network flows, the proposed method improves robustness and generalization across heterogeneous cloud environments. Extensive evaluations on publicly available datasets (CIC-IDS2017, CSE-CIC-IDS2018, and UNSW-NB15) under limited-label conditions demonstrate that the proposed framework consistently outperforms state-of-the-art supervised and semi-supervised network intrusion detection systems in detection performance, label efficiency, and resilience to adversarial and non-stationary traffic.

📬 Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.