The Application of Extreme Learning Machines to the Network Intrusion Detection Problem

被引:9
|
作者
Creech, Gideon [1 ,2 ]
Jiang, Frank [1 ]
机构
[1] Univ New South Wales, Australian Def Force Acad, Royal Australian Navy, Sydney, NSW 2052, Australia
[2] Royal Austrilian Navy, Canberra, ACT, Australia
来源
NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM 2012), VOLS A AND B | 2012年 / 1479卷
关键词
Multi-layer neural network; intrusion detection systems; pattern recognition; SCHEME;
D O I
10.1063/1.4756450
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The Extreme Learning Machine (ELM) algorithm conventionally suffers from the inferior batch training performance. In this paper, a new approach to combine ELM outputs is proposed with a view to further develop a persistent IDS. Specifically, this paper proposes the application of an Extreme Learning Machine based approach to the network-based intrusion detection system (IDSs). Good performance is achieved and preliminary results are reported in this paper.
引用
收藏
页码:1506 / 1511
页数:6
相关论文
共 50 条
  • [1] Extreme Learning Machines for Intrusion Detection
    Cheng, Chi
    Tay, Wee Peng
    Huang, Guang-Bin
    2012 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2012,
  • [2] Extreme Learning Machines for Intrusion Detection Systems
    de Farias, Gilles Paiva M.
    de Oliveira, Adriano L. I.
    Cabral, George G.
    NEURAL INFORMATION PROCESSING, ICONIP 2012, PT IV, 2012, 7666 : 535 - 543
  • [3] An efficient cascaded method for network intrusion detection based on extreme learning machines
    Yu, Yuanlong
    Ye, Zhifan
    Zheng, Xianghan
    Rong, Chunming
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 5797 - 5812
  • [4] An efficient cascaded method for network intrusion detection based on extreme learning machines
    Yuanlong Yu
    Zhifan Ye
    Xianghan Zheng
    Chunming Rong
    The Journal of Supercomputing, 2018, 74 : 5797 - 5812
  • [5] Application of deep extreme learning machine in network intrusion detection systems
    Wuke, Li
    Guangluan, Yin
    Xiaoxiao, Chen
    IAENG International Journal of Computer Science, 2020, 47 (02) : 136 - 143
  • [6] Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines
    Roshan, Setareh
    Miche, Yoan
    Akusok, Anton
    Lendasse, Amaury
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2018, 355 (04): : 1752 - 1779
  • [7] Network intrusion detection using equality constrained-optimization-based extreme learning machines
    Wang, Cheng-Ru
    Xu, Rong-Fang
    Lee, Shie-Jue
    Lee, Chie-Hong
    KNOWLEDGE-BASED SYSTEMS, 2018, 147 : 68 - 80
  • [8] Application of weighted support vector machines to network intrusion detection
    Jia, YS
    Jia, CY
    Qi, HW
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1025 - 1029
  • [9] Analysis of Extreme Learning Machines (ELMs) for intelligent intrusion detection systems: A survey
    Abu Al-Haija, Qasem
    Altamimi, Shahad
    AlWadi, Mazen
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 253
  • [10] A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection
    Gouveia, Arnaldo
    Correia, Miguel
    ADVANCES IN COMPUTATIONAL INTELLIGENCE, IWANN 2017, PT I, 2017, 10305 : 432 - 446