SEARCH WITHIN CONTENT
Citation Information : International Journal of Advanced Network, Monitoring and Controls. Volume 2, Issue 3, Pages 54-60, DOI: https://doi.org/10.1109/iccnea.2017.57
License : (CC BY-NC-ND 4.0)
Published Online: 11-April-2018
Nowadays with the rapid development of network-based services and users of the internet in everyday life, intrusion detection becomes a promising area of research in the domain of security. Intrusion detection system (IDS) can detect the intrusions of someone who is not authorized to the present computer system automatically, so intrusion detection system has emerged as an essential component and an important technique for network security.
Extreme learning machine (ELM) is an interested area of research for detecting possible intrusions and attacks. In this paper, we propose an improved learning algorithm named self-adaptive differential evolution extreme learning machine (SADE-ELM) for classifying and detecting the intrusions. We compare our methods with commonly used ELM, DE-ELM techniques in classifications. Simulation results show that the proposed SADE-ELM approach achieves higher detection accuracy in classification case.
Ilgun, K., Kemmerer, R.A., Porras, P.A., 1995. State transition analysis: a rule-based intrusion detection approach. IEEE Trans. Software Eng. 21 (3), 181–199.
Ikram S T, Cherukuri A K. Improving Accuracy of Intrusion Detection Model Using PCA and optimized SVM[J]. CIT. Journal of Computing and Information Technology, 2016, 24(2): 133-148.
Huang GB, Zhu QY, Siew CK. Extreme learning machine: a new learning scheme of feedforward neural networks. In: Proceedings of international joint conference on neural networks (IJCNN2004), vol 2, no 25–29, pp 985–990.
Huang GB, Zhu QY, Siew CK. Extreme learning machine: theory and applications. Neurocomputing 70(1–3):489–501.
Espana-Boquera S, Zamora-Martínez F, Castro-Bleda M J, et al. Efficient BP algorithms for general feedforward neural networks[C]//International Work-Conference on the Interplay Between Natural and Artificial Computation. Springer Berlin Heidelberg, 2007: 327-336.
G. Thatte, U. Mitra, and J. Heidemann, “Parametric methods for anomaly detection in aggregate traffic,” IEEE/ACM Transactions on Networking, vol. 19, no. 2, pp. 512–525, April 2011.
M. Qin and K. Hwang, “Frequent episode rules for internet anomaly detection,” in Proceedings of the Network Computing and Applications, Third IEEE International Symposium. Washington, DC, USA: IEEE Computer Society, 2004, pp. 161–168.
X. He, C. Papadopoulos, J. Heidemann, U. Mitra, and U. Riaz, “Remote detection of bottleneck links using spectral and statistical methods,” Computer Networks, vol. 53, pp. 279–298, February 2009.
W. W. Streilein, R. K. Cunningham, and S. E. Webster, “Improved detec- tion of low-profile probe and denial-of-service attacks,” in Proceedings of the 2001 Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, June 2001.
C. Cortes and V. Vapnik, “Support-vector networks,” Machine Learning, vol. 20, pp. 273–297, 1995.
G.-B. Huang, D. H. Wang, and Y. Lan, “Extreme learning machines: a survey,” International Journal of Machine Leaning and Cybernetics, vol. 2, no. 2, pp. 107–122, 2011.
G. Tandon, “Weighting versus pruning in rule validation for detecting network and host anomalies,” in In Proceedings of the 13th ACM SIGKDD international. ACM Press, 2007.
Y. Liao and V. R. Vemuri, “Use of k-nearest neighbor classifier for intrusion detection,” Computers & Security, vol. 25, pp. 439–448, 2002.
Storn R, Price K (2004) Differential evolution—a simple and efficient heuristic for global optimization over continuous spaces. J Glob Optim 11(4):341–359
Ilonen J, Kamarainen JI, Lampinen J (2003) Differential evolution training algorithm for feedforward neural networks. Neural Process Lett 17:93–105
Subudhi B, Jena D (2008) Differential evolution and levenberg marquardt trained neural network scheme for nonlinear system identification. Neural Process Lett 27:285–296.
Zhu Q-Y, Qin A-K, Suganthan P-N, Huang G-B (2005) Evolutionary extreme learning machine. Pattern Recog 38(10):1759–1763
S. Mukkamala and A. Sung, “Detecting denial of service attacks using support vector machines,” in Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003.
M. Luo, L. Wang, H. Zhang, and J. Chen, “A research on intrusion detection based on unsupervised clustering and support vector machine,” in Information and Communications Security, ser. Lecture Notes in Computer Science, S. Qing, D. Gollmann, and J. Zhou, Eds. Springer Berlin / Heidelberg, 2003, vol. 2836, pp. 325–336.
D. Kim and J. Park, “Network-based intrusion detection with support vector machines,” in Information Networking, ser. Lecture Notes in Computer Science, H.-K. Kahng, Ed. Springer Berlin / Heidelberg, 2003, vol. 2662, pp. 747–756.
Lin, Y., Lv, F., Zhu S., Yang, M., Cour, T., Yu, K., Cao, L., Huang, T.S.: Large-scale image classification: fast feature extraction and SVM training. In: Proceedings of the 24th IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1689-1696 (2011).
Huang G-B, Chen L, Siew CK (2006) Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Trans Neural Netw17(4):879-892
R. Storn, K. Price, Differential evolution-A simple and efficient heuristic for global optimization over continuous spaces, Journal of Global Optimization, 11 (1997) 341-359.
J. Brest, S. Greiner, B. Boˇskovi´c, M. Mernik, V. ˇZumer, Self-adapting control parameters in differential evolution: A comprehensive study on numerical benchmark problems. IEEE Transactions on Evolutionary Computation, 10 (2006) 646-657.
J. Wu, Z. H. Cai, Attribute Weighting via Differential Evolution Algorithm for Attribute Weighted Naive Bayes (WNB), Journal of Computational Information Systems, 7 (2011) 1672-1679.
S. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, “Costbased modeling for fraud and intrusion detection: results from the JAM project,” in Proceedings of DARPA Information Survivability Conference and Exposition, vol. 2, January 2002, pp. 130–144..