Hybrid extreme learning machine-based approach for IDS in smart Ad Hoc networks

被引:2
作者
Liu, Bijian [1 ]
机构
[1] Fujian Vocat Coll Agr, Fuzhou, Fujian, Peoples R China
关键词
Extreme learning machine; Intrusion detection system; Detection accuracy; Detection time; Multi-node ad hoc network; And RMSE; DIFFERENTIAL EVOLUTION; INTRUSION DETECTION; ANOMALY DETECTION; SYSTEM; SCHEME;
D O I
10.1186/s13638-023-02297-6
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, intrusion detection systems (IDSs) have increasingly come to be regarded as a significant method due to their potential to develop into a key component that is necessary for the safety of computer networks. This work focuses on the usage of extreme learning machines, which are also known as ELMs, with the purpose of spotting prospective intrusions and assaults. The proposed method combines the self-adaptive differential evolution method for optimising network input weights and hidden node biases and multi-node probabilistic approach with the extreme learning machine for deriving network output weights. This body of work presents an innovative method of learning that can be put into practice in order to determine whether or not an incursion has taken place in the system that is the focus of the investigation that is being carried out by this body of work. A hybrid extreme learning machine is used in the execution of this strategy. When there is one thousand times more traffic on a network, the ability of regular IDS systems to detect malicious network intrusions is lowered by a factor of one hundred. This is because there are less opportunities to detect the intrusions. This is due to the fact that there are less probabilities to identify potential dangers. This paper lays the groundwork for a novel methodology for identifying malicious network breaches. The findings of the simulation demonstrated that putting into practice the approach that was proposed resulted in an improvement in the accuracy of the scenario's classification while it was being investigated. The implementation of the method seems to have produced the desired results.
引用
收藏
页数:16
相关论文
共 37 条
  • [1] Experimental Evaluation of a Multi-Layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System
    Al-Zewairi, Malek
    Almajali, Sufyan
    Awajan, Arafat
    [J]. 2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, : 167 - 172
  • [2] Anderson J. P., 1980, Computer Security Threat Monitoring and Surveillance
  • [3] [Anonymous], 1995, NATURE STAT LEARNING
  • [4] [Anonymous], 2017, J JILIN U
  • [5] Self-adapting control parameters in differential evolution: A comparative study on numerical benchmark problems
    Brest, Janez
    Greiner, Saso
    Boskovic, Borko
    Mernik, Marjan
    Zumer, Vijern
    [J]. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2006, 10 (06) : 646 - 657
  • [6] Extreme Learning Machines for Intrusion Detection
    Cheng, Chi
    Tay, Wee Peng
    Huang, Guang-Bin
    [J]. 2012 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2012,
  • [7] CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
  • [8] España-Boquera S, 2007, LECT NOTES COMPUT SC, V4527, P327
  • [9] MARK-ELM: Application of a novel Multiple Kernel Learning framework for improving the robustness of Network Intrusion Detection
    Fossaceca, John M.
    Mazzuchi, Thomas A.
    Sarkani, Shahram
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (08) : 4062 - 4080
  • [10] Remote detection of bottleneck links using spectral and statistical methods
    He, Xinming
    Papadopoulos, Christos
    Heidemann, John
    Mitra, Urbashi
    Riaz, Usman
    [J]. COMPUTER NETWORKS, 2009, 53 (03) : 279 - 298