Hybrid extreme learning machine-based approach for IDS in smart Ad Hoc networks

被引:2
作者
Liu, Bijian [1 ]
机构
[1] Fujian Vocat Coll Agr, Fuzhou, Fujian, Peoples R China
关键词
Extreme learning machine; Intrusion detection system; Detection accuracy; Detection time; Multi-node ad hoc network; And RMSE; DIFFERENTIAL EVOLUTION; INTRUSION DETECTION; ANOMALY DETECTION; SYSTEM; SCHEME;
D O I
10.1186/s13638-023-02297-6
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, intrusion detection systems (IDSs) have increasingly come to be regarded as a significant method due to their potential to develop into a key component that is necessary for the safety of computer networks. This work focuses on the usage of extreme learning machines, which are also known as ELMs, with the purpose of spotting prospective intrusions and assaults. The proposed method combines the self-adaptive differential evolution method for optimising network input weights and hidden node biases and multi-node probabilistic approach with the extreme learning machine for deriving network output weights. This body of work presents an innovative method of learning that can be put into practice in order to determine whether or not an incursion has taken place in the system that is the focus of the investigation that is being carried out by this body of work. A hybrid extreme learning machine is used in the execution of this strategy. When there is one thousand times more traffic on a network, the ability of regular IDS systems to detect malicious network intrusions is lowered by a factor of one hundred. This is because there are less opportunities to detect the intrusions. This is due to the fact that there are less probabilities to identify potential dangers. This paper lays the groundwork for a novel methodology for identifying malicious network breaches. The findings of the simulation demonstrated that putting into practice the approach that was proposed resulted in an improvement in the accuracy of the scenario's classification while it was being investigated. The implementation of the method seems to have produced the desired results.
引用
收藏
页数:16
相关论文
共 37 条
  • [21] Luo M, 2003, LECT NOTES COMPUT SC, V2836, P325
  • [22] Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
  • [23] The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set
    Moustafa, Nour
    Slay, Jill
    [J]. INFORMATION SECURITY JOURNAL, 2016, 25 (1-3): : 18 - 31
  • [24] Mukkamala S, 2003, IEEE INT CONF FUZZY, P1231
  • [25] Effective approach toward Intrusion Detection System using data mining techniques
    Nadiammai, G. V.
    Hemalatha, M.
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2014, 15 (01) : 37 - 50
  • [26] A hybrid artificial immune system and Self Organising Map for network intrusion detection
    Powers, Simon T.
    He, Jun
    [J]. INFORMATION SCIENCES, 2008, 178 (15) : 3024 - 3042
  • [27] Qin M, 2004, THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, P161
  • [28] Ramadas M, 2003, LECT NOTES COMPUT SC, V2820, P36
  • [29] Shang W., 2013, ACTA ELECT SIN, V490-491, P1745
  • [30] Differential evolution - A simple and efficient heuristic for global optimization over continuous spaces
    Storn, R
    Price, K
    [J]. JOURNAL OF GLOBAL OPTIMIZATION, 1997, 11 (04) : 341 - 359