Robust Semi-Supervised Temporal Intrusion Detection for Adversarial Cloud Networks

arXiv cs.LG / 4/15/2026

💬 OpinionSignals & Early TrendsIdeas & Deep AnalysisModels & Research

Key Points

  • The paper addresses practical cloud intrusion detection challenges where labeled data is scarce, traffic is non-stationary over time, and adversaries can contaminate unlabeled traffic.
  • It proposes a robust semi-supervised temporal learning framework for flow-level intrusion detection that integrates supervised learning with consistency regularization and confidence-aware pseudo-labeling.
  • The method further uses selective temporal invariance to exploit temporal structure in network flows while filtering out unreliable unlabeled samples affected by drift or adversarial behavior.
  • Experiments on CIC-IDS2017, CSE-CIC-IDS2018, and UNSW-NB15 under limited-label settings show improved detection accuracy, better label efficiency, and increased resilience versus both supervised baselines and prior semi-supervised approaches.
  • Overall, the contribution focuses on improving generalization across heterogeneous cloud environments where common semi-supervised assumptions (benign, stationary unlabeled data) often fail.

Abstract

Cloud networks increasingly rely on machine learning based Network Intrusion Detection Systems to defend against evolving cyber threats. However, real-world deployments are challenged by limited labeled data, non-stationary traffic, and adaptive adversaries. While semi-supervised learning can alleviate label scarcity, most existing approaches implicitly assume benign and stationary unlabeled traffic, leading to degraded performance in adversarial cloud environments. This paper proposes a robust semi-supervised temporal learning framework for cloud intrusion detection that explicitly addresses adversarial contamination and temporal drift in unlabeled network traffic. Operating on flow-level data, this framework combines supervised learning with consistency regularization, confidence-aware pseudo-labeling, and selective temporal invariance to conservatively exploit unlabeled traffic while suppressing unreliable samples. By leveraging the temporal structure of network flows, the proposed method improves robustness and generalization across heterogeneous cloud environments. Extensive evaluations on publicly available datasets (CIC-IDS2017, CSE-CIC-IDS2018, and UNSW-NB15) under limited-label conditions demonstrate that the proposed framework consistently outperforms state-of-the-art supervised and semi-supervised network intrusion detection systems in detection performance, label efficiency, and resilience to adversarial and non-stationary traffic.