Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines

被引:50
|
作者
Roshan, Setareh [1 ,2 ]
Miche, Yoan [3 ]
Akusok, Anton [4 ]
Lendasse, Amaury [5 ,6 ]
机构
[1] F Secure Corp, Tammasaarenkatu 7, Helsinki 00180, Finland
[2] Aalto Univ, Sch Sci, Dept Comp Sci, Konemiehentie 2, Espoo 02150, Finland
[3] Nokia Bell Labs, Karakaari 13, Espoo 02760, Finland
[4] Arcada Univ Appl Sci, Jan Magnus Janssonin Aukio 1, Helsinki 00560, Finland
[5] Univ Iowa, Dept Mech & Ind Engn, Iowa City, IA USA
[6] Univ Iowa, Iowa Informat Initiat, Iowa City, IA USA
来源
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS | 2018年 / 355卷 / 04期
关键词
ELM;
D O I
10.1016/j.jfranklin.2017.06.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the large volume of research conducted in the field of intrusion detection, finding a perfect solution of intrusion detection systems for critical applications is still a major challenge. This is mainly due to the continuous emergence of security threats which can bypass the outdated intrusion detection systems. The main objective of this paper is to propose an adaptive design of intrusion detection systems on the basis of Extreme Learning Machines. The proposed system offers the capability of detecting known and novel attacks and being updated according to new trends of data patterns provided by security experts in a cost-effective manner. (c) 2017 The Frank linInstitute. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:1752 / 1779
页数:28
相关论文
共 50 条
  • [1] An intrusion detection system using network traffic profiling and online sequential extreme learning machine
    Singh, Raman
    Kumar, Harish
    Singla, R. K.
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (22) : 8609 - 8624
  • [2] The Application of Extreme Learning Machines to the Network Intrusion Detection Problem
    Creech, Gideon
    Jiang, Frank
    NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM 2012), VOLS A AND B, 2012, 1479 : 1506 - 1511
  • [3] Extreme Learning Machines for Intrusion Detection
    Cheng, Chi
    Tay, Wee Peng
    Huang, Guang-Bin
    2012 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2012,
  • [4] Extreme Learning Machines for Intrusion Detection Systems
    de Farias, Gilles Paiva M.
    de Oliveira, Adriano L. I.
    Cabral, George G.
    NEURAL INFORMATION PROCESSING, ICONIP 2012, PT IV, 2012, 7666 : 535 - 543
  • [5] Adaptive clustering for network intrusion detection
    Oldmeadow, J
    Ravinutala, S
    Leckie, C
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2004, 3056 : 255 - 259
  • [6] Network intrusion detection using equality constrained-optimization-based extreme learning machines
    Wang, Cheng-Ru
    Xu, Rong-Fang
    Lee, Shie-Jue
    Lee, Chie-Hong
    KNOWLEDGE-BASED SYSTEMS, 2018, 147 : 68 - 80
  • [7] An efficient cascaded method for network intrusion detection based on extreme learning machines
    Yu, Yuanlong
    Ye, Zhifan
    Zheng, Xianghan
    Rong, Chunming
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 5797 - 5812
  • [8] An efficient cascaded method for network intrusion detection based on extreme learning machines
    Yuanlong Yu
    Zhifan Ye
    Xianghan Zheng
    Chunming Rong
    The Journal of Supercomputing, 2018, 74 : 5797 - 5812
  • [9] Adaptive Intrusion Detection System via Online Machine Learning
    Hai Thanh Nguyen
    Franke, Katrin
    2012 12TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2012, : 271 - 277
  • [10] Using incremental learning method for adaptive network intrusion detection
    Yang, W
    Yun, XC
    Zhang, LJ
    Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 3932 - 3936