Enhance Intrusion Detection in Computer Networks Based on Deep Extreme Learning Machine

被引:19
作者
Khan, Muhammad Adnan [1 ]
Rehman, Abdur [2 ]
Khan, Khalid Masood [1 ]
Al Ghamdi, Mohammed A. [3 ]
Almotiri, Sultan H. [3 ]
机构
[1] Lahore Garrison Univ, Dept Comp Sci, Lahore 54792, Pakistan
[2] NCBA & E, Sch Comp Sci, Lahore 54000, Pakistan
[3] Umm Al Qura Univ, Comp Sci Dept, Makkah City 715, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 66卷 / 01期
关键词
Intrusion detection system; DELM; network security; machine learning; OPTIMIZATION; PREDICTION; SIMULATION; SERVICE;
D O I
10.32604/cmc.2020.013121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Networks provide a significant function in everyday life, and cybersecurity therefore developed a critical field of study. The Intrusion detection system (IDS) becoming an essential information protection strategy that tracks the situation of the software and hardware operating on the network. Notwithstanding advancements of growth, current intrusion detection systems also experience difficulties in enhancing detection precision, growing false alarm levels and identifying suspicious activities. In order to address above mentioned issues, several researchers concentrated on designing intrusion detection systems that rely on machine learning approaches. Machine learning models will accurately identify the underlying variations among regular information and irregular information with incredible efficiency. Artificial intelligence, particularly machine learning methods can be used to develop an intelligent intrusion detection framework. There in this article in order to achieve this objective, we propose an intrusion detection system focused on a Deep extreme learning machine (DELM) which first establishes the assessment of safety features that lead to their prominence and then constructs an adaptive intrusion detection system focusing on the important features. In the moment, we researched the viability of our suggested DELM-based intrusion detection system by conducting dataset assessments and evaluating the performance factors to validate the system reliability. The experimental results illustrate that the suggested framework outclasses traditional algorithms. In fact, the suggested framework is not only of interest to scientific research but also of functional importance.
引用
收藏
页码:467 / 480
页数:14
相关论文
共 35 条
[1]   Modeling, Simulation and Optimization of Power Plant Energy Sustainability for IoT Enabled Smart Cities Empowered With Deep Extreme Learning Machine [J].
Abbas, Sagheer ;
Khan, Muhammad Adnan ;
Eduardo Falcon-Morales, Luis ;
Rehman, Abdur ;
Saeed, Yousaf ;
Zareei, Mahdi ;
Zeb, Asim ;
Mohamed, Ehab Mahmoud .
IEEE ACCESS, 2020, 8 :39982-39997
[2]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[3]  
ALSHEIKH MA, 2014, IEEE COMMUN SURV TUT, V16, P1996, DOI DOI 10.1109/COMST.2014.2320099
[4]  
Alshinina R., 2018, WIREL TELECOMM SYMP, P1
[5]   BlockSDN: Blockchain-as-a-Service for Software Defined Networking in Smart City Applications [J].
Aujla, Gagangeet Singh ;
Singh, Maninderpal ;
Bose, Arnab ;
Kumar, Neeraj ;
Han, Guangjie ;
Buyya, Rajkumar .
IEEE NETWORK, 2020, 34 (02) :83-91
[6]   Smart City IoT Platform Respecting GDPR Privacy and Security Aspects [J].
Badii, Claudio ;
Bellini, Pierfrancesco ;
Difino, Angelo ;
Nesi, Paolo .
IEEE ACCESS, 2020, 8 :23601-23623
[7]   A Survey on Machine-Learning Techniques in Cognitive Radios [J].
Bkassiny, Mario ;
Li, Yang ;
Jayaweera, Sudharman K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1136-1159
[8]  
BUCZAK L, 2015, IEEE COMMUNICATIONS, V18, P1153
[9]  
CHEN J, 2017, MACHINE LEARNING WIR, V17, P1, DOI DOI 10.1166/JNN.2017.12932
[10]  
[程加堂 Cheng Jiatang], 2015, [振动与冲击, Journal of Vibration and Shock], V34, P177