Towards Improving the Intrusion Detection through ELM (Extreme Learning Machine)

被引:7
作者
Ahmad, Iftikhar [1 ]
Alsemmeari, Rayan Atteah [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, DIT, Jeddah 21589, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2020年 / 65卷 / 02期
关键词
Accuracy; extreme learning machine; sine function; sigmoid function; radial basis; genetic algorithm; NSL-KDD; SUPPORT VECTOR MACHINE; PERFORMANCE; SYSTEM;
D O I
10.32604/cmc.2020.011732
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An IDS (intrusion detection system) provides a foremost front line mechanism to guard networks, systems, data, and information. That's why intrusion detection has grown as an active study area and provides significant contribution to cyber-security techniques. Multiple techniques have been in use but major concern in their implementation is variation in their detection performance. The performance of IDS lies in the accurate detection of attacks, and this accuracy can be raised by improving the recognition rate and significant reduction in the false alarms rate. To overcome this problem many researchers have used different machine learning techniques. These techniques have limitations and do not efficiently perform on huge and complex data about systems and networks. This work focused on ELM (Extreme Learning Machine) technique due to its good capabilities in classification problems and dealing with huge data. The ELM has different activation functions, but the problem is to find out which function is more suitable and performs well in IDS. This work investigates this problem. Here, Well-known activation functions like: sine, sigmoid and radial basis are explored, investigated and applied to measure their performance on the GA (Genetic Algorithm) features subset and with full features set. The NSL-KDD dataset is used as a benchmark. The empirical results are analyzed, addressed and compared among different activation functions of the ELM. The results show that the radial basis and sine functions perform better on GA feature set than the full feature set while the performance of the sigmoid function is almost equal on both features sets. So, the proposal of GA based feature selection reduced 21 features out of 41 that brought up to 98% accuracy and enhanced overall efficiency of extreme learning machine in intrusion detection.
引用
收藏
页码:1097 / 1111
页数:15
相关论文
共 24 条
[1]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[2]   Enhancing MLP Performance in Intrusion Detection using Optimal Feature Subset Selection based on Genetic Principal Components [J].
Ahmad, Iftikhar .
APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (02) :639-649
[3]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[4]  
[Anonymous], 2017, SYST C SYSCON 2017 A
[5]   Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space [J].
Atli, Buse Gul ;
Miche, Yoan ;
Kalliola, Aapo ;
Oliver, Ian ;
Holtmanns, Silke ;
Lendasse, Amaury .
COGNITIVE COMPUTATION, 2018, 10 (05) :848-863
[6]  
Douzi S., 2018, 2018 2 CYB SEC NETW, P1
[7]   A hybrid deep learning CNN-ELM for age and gender classification [J].
Duan, Mingxing ;
Li, Kenli ;
Yang, Canqun ;
Li, Keqin .
NEUROCOMPUTING, 2018, 275 :448-461
[8]  
Imamverdiyev Y., P 2016 IEEE 10 INT C
[9]   DGR-ELM-Distribute d Generalized Regularize ELM for classification [J].
Inaba, Fernando Kentaro ;
Teatini Salles, Evandro Ottoni ;
Perron, Sylvain ;
Caporossi, Gilles .
NEUROCOMPUTING, 2018, 275 :1522-1530
[10]   Intrusion Detection Based on Self-adaptive Differential Evolutionary Extreme Learning Machine [J].
Ku, Junhua ;
Yun, Dawei ;
Zheng, Bing .
2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, :94-100