Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space

被引:45
作者
Atli, Buse Gul [1 ]
Miche, Yoan [2 ]
Kalliola, Aapo [2 ]
Oliver, Ian [2 ]
Holtmanns, Silke [2 ]
Lendasse, Amaury [3 ]
机构
[1] Aalto Univ, Dept Signal Proc & Acoust, Espoo, Finland
[2] Nokia Bell Labs, Espoo, Finland
[3] Univ Iowa, Iowa City, IA 52242 USA
基金
欧盟地平线“2020”;
关键词
Intrusion detection; Network behavior analysis; Probability density function; Hierarchical clustering; Extreme learning machine; SYSTEMS;
D O I
10.1007/s12559-018-9564-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, with the increased use of network communication, the risk of compromising the information has grown immensely. Intrusions have become more sophisticated and few methods can achieve efficient results while the network behavior constantly changes. This paper proposes an intrusion detection system based on modeling distributions of network statistics and Extreme Learning Machine (ELM) to achieve high detection rates of intrusions. The proposed model aggregates the network traffic at the IP subnetwork level and the distribution of statistics are collected for the most frequent IPv4 addresses encountered as destination. The obtained probability distributions are learned by ELM. This model is evaluated on the ISCX-IDS 2012 dataset, which is collected using a real-time testbed. The model is compared against leading approaches using the same dataset. Experimental results show that the presented method achieves an average detection rate of 91% and a misclassification rate of 9%. The experimental results show that our methods significantly improve the performance of the simple ELM despite a trade-off between performance and time complexity. Furthermore, our methods achieve good performance in comparison with the other few state-of-the-art approaches evaluated on the ISCX-IDS 2012 dataset.
引用
收藏
页码:848 / 863
页数:16
相关论文
共 38 条
[21]   Design of an Evolutionary Approach for Intrusion Detection [J].
Kumar, Gulshan ;
Kumar, Krishan .
SCIENTIFIC WORLD JOURNAL, 2013,
[22]   Use of K-Nearest Neighbor classifier for intrusion detection [J].
Liao, YH ;
Vemuri, VR .
COMPUTERS & SECURITY, 2002, 21 (05) :439-448
[23]   Network Anomaly Detection System: The State of Art of Network Behaviour Analysis [J].
Lim, Shu Yun ;
Jones, Andy .
ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, :459-465
[24]   Multiple kernel extreme learning machine [J].
Liu, Xinwang ;
Wang, Lei ;
Huang, Guang-Bin ;
Zhang, Jian ;
Yin, Jianping .
NEUROCOMPUTING, 2015, 149 :253-264
[25]   An Efficient Approach to Integrating Radius Information into Multiple Kernel Learning [J].
Liu, Xinwang ;
Wang, Lei ;
Yin, Jianping ;
Zhu, En ;
Zhang, Jian .
IEEE TRANSACTIONS ON CYBERNETICS, 2013, 43 (02) :557-569
[26]  
Lucas M.W., 2010, Network Flow Analysis, V1st
[27]   Online Extreme Learning Machine with Hybrid Sampling Strategy for Sequential Imbalanced Data [J].
Mao, Wentao ;
Jiang, Mengxue ;
Wang, Jinwan ;
Li, Yuan .
COGNITIVE COMPUTATION, 2017, 9 (06) :780-800
[28]   OP-ELM: Optimally Pruned Extreme Learning Machine [J].
Miche, Yoan ;
Sorjamaa, Antti ;
Bas, Patrick ;
Simula, Olli ;
Jutten, Christian ;
Lendasse, Amaury .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2010, 21 (01) :158-162
[29]   An overview of anomaly detection techniques: Existing solutions and latest technological trends [J].
Patcha, Animesh ;
Park, Jung-Min .
COMPUTER NETWORKS, 2007, 51 (12) :3448-3470
[30]  
Perkins C., 2002, IP MOBILITY SUPPORT