Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space

被引:45
作者
Atli, Buse Gul [1 ]
Miche, Yoan [2 ]
Kalliola, Aapo [2 ]
Oliver, Ian [2 ]
Holtmanns, Silke [2 ]
Lendasse, Amaury [3 ]
机构
[1] Aalto Univ, Dept Signal Proc & Acoust, Espoo, Finland
[2] Nokia Bell Labs, Espoo, Finland
[3] Univ Iowa, Iowa City, IA 52242 USA
基金
欧盟地平线“2020”;
关键词
Intrusion detection; Network behavior analysis; Probability density function; Hierarchical clustering; Extreme learning machine; SYSTEMS;
D O I
10.1007/s12559-018-9564-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, with the increased use of network communication, the risk of compromising the information has grown immensely. Intrusions have become more sophisticated and few methods can achieve efficient results while the network behavior constantly changes. This paper proposes an intrusion detection system based on modeling distributions of network statistics and Extreme Learning Machine (ELM) to achieve high detection rates of intrusions. The proposed model aggregates the network traffic at the IP subnetwork level and the distribution of statistics are collected for the most frequent IPv4 addresses encountered as destination. The obtained probability distributions are learned by ELM. This model is evaluated on the ISCX-IDS 2012 dataset, which is collected using a real-time testbed. The model is compared against leading approaches using the same dataset. Experimental results show that the presented method achieves an average detection rate of 91% and a misclassification rate of 9%. The experimental results show that our methods significantly improve the performance of the simple ELM despite a trade-off between performance and time complexity. Furthermore, our methods achieve good performance in comparison with the other few state-of-the-art approaches evaluated on the ISCX-IDS 2012 dataset.
引用
收藏
页码:848 / 863
页数:16
相关论文
共 38 条
[11]   An Adaptive Density Data Stream Clustering Algorithm [J].
Ding, Shifei ;
Zhang, Jian ;
Jia, Hongjie ;
Qian, Jun .
COGNITIVE COMPUTATION, 2016, 8 (01) :30-38
[12]   A Distributed Intrusion Detection Framework Based on Evolved Specialized Ensembles of Classifiers [J].
Folino, Gianluigi ;
Pisani, Francesco Sergio ;
Sabatino, Pietro .
APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2016, PT I, 2016, 9597 :315-331
[13]   K-Means+ID3: A novel method for supervised anomaly detection by cascading k-Means clustering and ID3 decision tree learning methods [J].
Gaddam, Shekhar R. ;
Phoha, Vir V. ;
Balagani, Kiran S. .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (03) :345-354
[14]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28
[15]  
Huang G-B, 2005, ON LINE SEQUENTIAL E
[16]   Extreme learning machine: Theory and applications [J].
Huang, Guang-Bin ;
Zhu, Qin-Yu ;
Siew, Chee-Kheong .
NEUROCOMPUTING, 2006, 70 (1-3) :489-501
[17]   Universal approximation using incremental constructive feedforward networks with random hidden nodes [J].
Huang, Guang-Bin ;
Chen, Lei ;
Siew, Chee-Kheong .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2006, 17 (04) :879-892
[18]   What are Extreme Learning Machines? Filling the Gap Between Frank Rosenblatt's Dream and John von Neumann's Puzzle [J].
Huang, Guang-Bin .
COGNITIVE COMPUTATION, 2015, 7 (03) :263-278
[19]   An Insight into Extreme Learning Machines: Random Neurons, Random Features and Kernels [J].
Huang, Guang-Bin .
COGNITIVE COMPUTATION, 2014, 6 (03) :376-390
[20]   A new intrusion detection system using support vector machines and hierarchical clustering [J].
Khan, Latifur ;
Awad, Mamoun ;
Thuraisingham, Bhavani .
VLDB JOURNAL, 2007, 16 (04) :507-521