Artikel COMNETS View

IDS Using Unsupervised Learning: Adapting to Modern Network Traffic, Sophisticated Attacks, and Memory‑Prediction Approaches

Prof. Dr. Rahmat Budiarto04 Mei 2026Tahun 2026 Vol. 1No. 2
Ikhtisar artikel

Artikel ini dipublikasikan sebagai bagian dari COMNETS View, ruang publikasi editorial COMNETS Research Group.

COMNETS View
Vol. 1 • No. 2 • 2026
Buka edisi
IDS Using Unsupervised Learning: Adapting to Modern Network Traffic, Sophisticated Attacks, and Memory‑Prediction Approaches

As network environments grow in scale, heterogeneity, and dynamism, traditional signature‑based intrusion detection struggles to keep pace. Unsupervised learning is a technique that detects anomalies without requiring labeled attack examples has become central to modern Intrusion Detection System (IDS) design because it can discover novel and polymorphic threats in complex traffic

Modern network traffics carry diverse, high‑velocity flows: encrypted traffic (TLS 1.3, QUIC), ephemeral micro-services communications (service meshes, gRPC), IoT telemetry, and cloud‑native east‑west traffic. These characteristics complicate feature extraction and baseline modeling in several ways, i.e.: High dimensionality and heterogeneity; Concept drift; Low event signal-to-noise ratio, where malicious events are sparse and can be camouflaged by benign but unusual behavior. Unsupervised IDS must therefore build robust, adaptive representations that tolerate benign variability while remaining sensitive to subtle anomalies.

On the other hand, modern attackers leverage techniques that defeat naïve anomaly detectors such as: (i) Living‑off‑the‑land and file-less attacks by abusing legitimate processes and APIs, producing activity that superficially resembles benign behavior. (ii) Slow‑burn or low‑and‑slow exfiltration by spreading malicious actions across long time windows to avoid short‑term thresholds. (iii) Polymorphism and adversarial perturbation by modifying payloads or timings to remain within learned normal bounds or to exploit detector weaknesses, and (iv) Multi‑stage campaigns, including: reconnaissance, lateral movement, and data staging each exhibit different signatures, requiring cross‑stage correlation.

Detecting such threats requires unsupervised systems that can (1) model temporal dependencies across multiple scales, (2) learn semantically meaningful representations of flows (beyond raw packet counts), and (3) incorporate context (host, user, service) to reduce false positives. Ensemble and hierarchical approaches that combine short‑window detectors with longer‑term models are often effective (Mirsky, et al. 2018).

Unsupervised methods for network anomaly detection comprise various approaches that learn normal behavior without needing large sets of labeled attack examples. A typical pipeline (see Figure 1) first converts raw network data into features; an unsupervised model then captures patterns from mostly benign traffic; departures from those patterns are scored; and a thresholding stage turns scores into alerts. Methods within this framework differ in how they define “normal” (e.g., distributional, geometric, predictive, or reconstruction-based), how they compute anomaly scores, and how they preserve stability in the face of noise, multi‑modality, and non-stationarity (Wang, et al. 2021; Gamage, et al. 2020).

  • Memory‑prediction architectures, i.e.: models that incorporate explicit memory components and predictive objectives are gaining traction in unsupervised IDS for several reasons:
    Predictive power: Training models to predict future observations (next flow features, sequence of events) encourages learning of temporal regularities; deviations between predictions and actual observations highlight anomalies.
  • Long‑term context: External memory mechanisms (neural memory, attention, or differentiable memory modules) allow models to recall and compare current behavior with historical patterns across hosts, users, or services.
  • Fast adaptation: Memory components facilitate few‑shot assimilation of new benign patterns without catastrophic forgetting, aiding concept drift handling

Figure 1. Conceptual Framework of Unsupervised Anomaly Detection with On-the-Fly and Memory-Aware Learning (Alqithami, et al. 2025)

Thus, unsupervised learning is vital for contemporary IDS, as it enables detection of new and complex threats in evolving network settings. Advances depend on strong representation learning, time-aware and memory‑enhanced predictive models, and thoughtful operational deployment. Going forward, developments will likely unite scalable unsupervised models, continual learning to handle concept drift, and feedback mechanisms for analysts that link detection to response.

Reference

Mirsky, Yisroel, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. 2018. “Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.” In Proceedings of the Network and Distributed System Security Symposium (NDSS) 2018.

Saad Alqithami, Deris Stiawan, Rahmat Budiarto, 2025, On-the-fly, memory-aware unsupervised learning for network anomaly detection: A systematic literature review, e-Prime - Advances in Electrical Engineering, Electronics and Energy, 101146, doi:10.1016/j.prime.2025.101146.

S. Wang, J.F. Balarezo, S. Kandeepan, A. Al-Hourani, K. Gome. Chavez, B. Ru-binstein, Machine learning in network anomaly detection: A survey, IEEE Access 9 (2021) 152904–152922, http://dx.doi.org/10.1109/ACCESS.2021.3125219.

S. Gamage, J. Samarabandu, Deep learning methods in network intrusion detection: A survey and an objective comparison, J. Netw. Comput. Appl. 169 (2020) 102767, http://dx.doi.org/10.1016/j.jnca.2020.102767.