Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection

被引:341
作者
Ahmad, Iftikhar [1 ]
Basheri, Mohammad [1 ]
Iqbal, Muhammad Javed [2 ]
Rahim, Aneel [3 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Technol, Jeddah 21589, Saudi Arabia
[2] Univ Engn & Technol Taxila, Dept Comp Sci, Taxila 47080, Pakistan
[3] Dublin Inst Technol, Sch Comp, Dublin D08 X622, Ireland
关键词
Detection rate; extreme learning machine; false alarms; NSL-KDD; random forest; support vector machine; SVM; CLASSIFICATION;
D O I
10.1109/ACCESS.2018.2841987
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls. Various intrusion detection techniques are used, but their performance is an issue. Intrusion detection performance depends on accuracy, which needs to improve to decrease false alarms and to increase the detection rate. To resolve concerns on performance, multilayer perceptron, support vector machine (SVM), and other techniques have been used in recent work. Such techniques indicate limitations and are not effcient for use in large data sets, such as system and network data. The intrusion detection system is used in analyzing huge traffc data; thus, an effcient classifcation technique is necessary to overcome the issue. This problem is considered in this paper. Well-known machine learning techniques, namely, SVM, random forest, and extreme learning machine (ELM) are applied. These techniques are well-known because of their capability in classifcation. The NSL-knowledge discovery and data mining data set is used, which is considered a benchmark in the evaluation of intrusion detection mechanisms. The results indicate that ELM outperforms other approaches.
引用
收藏
页码:33789 / 33795
页数:7
相关论文
共 20 条
[1]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[2]   Feature Selection Using Particle Swarm Optimization in Intrusion Detection [J].
Ahmad, Iftikhar .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
[3]  
Ahmad I, 2014, 2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), P68, DOI 10.1109/ITAIC.2014.7065007
[4]  
[Anonymous], 2011, ACM T INTEL SYST TEC, DOI DOI 10.1145/1961189.1961199
[5]   Comparison of classification techniques applied for network intrusion detection and classification [J].
Aziz, Amira Sayed A. ;
EL-Ola Hanafi, Sanaa ;
Hassanien, Aboul Ella .
JOURNAL OF APPLIED LOGIC, 2017, 24 :109-118
[6]   An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization [J].
Bamakan, Seyed Mojtaba Hosseini ;
Wang, Huadong ;
Tian Yingjie ;
Shi, Yong .
NEUROCOMPUTING, 2016, 199 :90-102
[7]   Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks [J].
Derhab, Abdelouahid ;
Bouras, Abdelghani ;
Senouci, Mustapha Reda ;
Imran, Muhammad .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
[8]   A hybrid network intrusion detection framework based on random forests and weighted k-means [J].
Elbasiony, Reda M. ;
Sallam, Elsayed A. ;
Eltobely, Tarek E. ;
Fahmy, Mahmoud M. .
AIN SHAMS ENGINEERING JOURNAL, 2013, 4 (04) :753-762
[9]   Random Forest Modeling for Network Intrusion Detection System [J].
Farnaaz, Nabila ;
Jabbar, M. A. .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :213-217
[10]  
Huang GB, 2004, IEEE IJCNN, P985