Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space

被引:45
作者
Atli, Buse Gul [1 ]
Miche, Yoan [2 ]
Kalliola, Aapo [2 ]
Oliver, Ian [2 ]
Holtmanns, Silke [2 ]
Lendasse, Amaury [3 ]
机构
[1] Aalto Univ, Dept Signal Proc & Acoust, Espoo, Finland
[2] Nokia Bell Labs, Espoo, Finland
[3] Univ Iowa, Iowa City, IA 52242 USA
基金
欧盟地平线“2020”;
关键词
Intrusion detection; Network behavior analysis; Probability density function; Hierarchical clustering; Extreme learning machine; SYSTEMS;
D O I
10.1007/s12559-018-9564-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, with the increased use of network communication, the risk of compromising the information has grown immensely. Intrusions have become more sophisticated and few methods can achieve efficient results while the network behavior constantly changes. This paper proposes an intrusion detection system based on modeling distributions of network statistics and Extreme Learning Machine (ELM) to achieve high detection rates of intrusions. The proposed model aggregates the network traffic at the IP subnetwork level and the distribution of statistics are collected for the most frequent IPv4 addresses encountered as destination. The obtained probability distributions are learned by ELM. This model is evaluated on the ISCX-IDS 2012 dataset, which is collected using a real-time testbed. The model is compared against leading approaches using the same dataset. Experimental results show that the presented method achieves an average detection rate of 91% and a misclassification rate of 9%. The experimental results show that our methods significantly improve the performance of the simple ELM despite a trade-off between performance and time complexity. Furthermore, our methods achieve good performance in comparison with the other few state-of-the-art approaches evaluated on the ISCX-IDS 2012 dataset.
引用
收藏
页码:848 / 863
页数:16
相关论文
共 38 条
[1]   A Two-Stage Methodology Using K-NN and False-Positive Minimizing ELM for Nominal Data Classification [J].
Akusok, Anton ;
Miche, Yoan ;
Hegedus, Jozsef ;
Nian, Rui ;
Lendasse, Amaury .
COGNITIVE COMPUTATION, 2014, 6 (03) :432-445
[2]  
Ammar A., 2015, Journal of Computer and Communications, V3, P52
[3]  
[Anonymous], 2006, ACM S INFORM COMPUTE, DOI DOI 10.1145/1128817.1128834
[4]  
[Anonymous], 2017, IEEE T FUZZY SYSTEMS
[5]  
Bace R., 2001, NIST Special Publication on Intrusion Detection Systems
[6]  
Baeza-Yates R., 1999, Modern information retrieval, V463
[7]  
Barayas O, INTERNET THINGS IS C
[8]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[9]  
Bishop Christopher M, 2016, Pattern recognition and machine learning
[10]  
Cormode G., 2003, P 29 INT C VER LARG, P464