Deep Belief Network Integrating Improved Kernel-Based Extreme Learning Machine for Network Intrusion Detection

被引:75
作者
Wang, Zhendong [1 ]
Zeng, Yong [1 ]
Liu, Yaodi [1 ]
Li, Dahai [1 ]
机构
[1] Jiangxi Univ Sci & Technol, Coll Informat Engn, Ganzhou 341000, Peoples R China
基金
中国国家自然科学基金;
关键词
Intrusion detection; deep belief network; kernel-based extreme learning machine; grey wolf optimizer;
D O I
10.1109/ACCESS.2021.3051074
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning has become a research hotspot in the field of network intrusion detection. In order to further improve the detection accuracy and performance, we proposed an intrusion detection model based on improved deep belief network (DBN). Traditional neural network training methods, like Back Propagation (BP), start to train a model with preset parameters such as the randomly initialized weights and thresholds, which may bring some issues, e.g., attracting the model to the local optimal solutions, or requiring a long training period. We use the Kernel-based Extreme Learning Machine (KELM) with the supervised learning ability to replace the BP algorithm in DBN in a bid to ameliorate the situation. Considering the problem of poor classification performance usually caused by randomly initializing kernel parameters with KELM, an enhanced grey wolf optimizer (EGWO) is designed to optimize the parameters of KELM. In order to improve the search ability and optimization ability of the traditional grey wolf optimizer algorithm, a novel optimization strategy combining the inner and outer hunting is introduced. Experiments on KDDCup99, NSL-KDD, UNSW-NB15 and CICIDS2017 datasets show that the proposed DBN-EGWO-KELM algorithm has greater advantages in terms of its accuracy, precision, true positive rate, false positive rate and other evaluation indices compared with BP, RBF, SVM, KELM, LIBSVM, CNN, DBN-KELM and other intrusion detection models, and can effectively meet the requirements of intrusion detection of complex networks.
引用
收藏
页码:16062 / 16091
页数:30
相关论文
共 49 条
[1]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[2]  
Alippi C., 2010, The 2010 International Joint Conference on Neural Networks (IJCNN), P1, DOI DOI 10.1109/IJCNN.2010.5596899
[3]   Intrusion detection system based on a modified binary grey wolf optimisation [J].
Alzubi, Qusay M. ;
Anbar, Mohammed ;
Alqattan, Zakaria N. M. ;
Al-Betar, Mohammed Azmi ;
Abdullah, Rosni .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (10) :6125-6137
[4]  
[Anonymous], 2002, P WORKSH MACH LEARN
[5]   Experimentally optimal ν in support vector regression for different noise models and parameter settings [J].
Chalimourda, A ;
Schölkopf, B ;
Smola, AJ .
NEURAL NETWORKS, 2004, 17 (01) :127-141
[6]   Analysis of KDD-Cup'99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT [J].
Choudhary, Sarika ;
Kesswani, Nishtha .
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 :1561-1573
[7]  
Elouedi Z., 14 EUR C MACH LEARN, P11
[8]  
Ertöz L, 2003, SIAM PROC S, P47
[9]   An Adaptive Ensemble Machine Learning Model for Intrusion Detection [J].
Gao, Xianwei ;
Shan, Chun ;
Hu, Changzhen ;
Niu, Zequn ;
Liu, Zhen .
IEEE ACCESS, 2019, 7 :82512-82521
[10]   Reducing the dimensionality of data with neural networks [J].
Hinton, G. E. ;
Salakhutdinov, R. R. .
SCIENCE, 2006, 313 (5786) :504-507