Extreme learning machines for intrusion detection systems

作者: Gilles Paiva M. de Farias , Adriano L. I. de Oliveira , George G. Cabral

DOI: 10.1007/978-3-642-34478-7_65

关键词:

摘要: Information is a powerful tool that can be used as competitive advantage to increase market shares, competitiveness and keep products up-to-date. Protecting the information difficult task; intrusion detection systems one of tools great importance for protection computer network infrastructures. IDSs (Intrusion Detection Systems) are help users administrators safe from intruders attacks various natures. Machine learning techniques most popular proposed investigated in literature. This paper focuses on use ELM (Extreme Learning Machine) OS-ELM (Online Sequential ELM) applied IDSs. Some features these methods motivate their building are: (i) easy assignment parameters; (ii) good generalization; (iii) fast online training. The results show easily huge amount data without significant generalization loss.

参考文章(11)
Jingwen Tian, Meijuan Gao, Fan Zhang, Network Intrusion Detection Method Based on Radial Basic Function Neural Network 2009 International Conference on E-Business and Information System Security. pp. 1- 4 ,(2009) , 10.1109/EBISS.2009.5138016
Srinivas Mukkamala, Andrew H Sung, Ajith Abraham, None, Intrusion detection using an ensemble of intelligent paradigms Journal of Network and Computer Applications. ,vol. 28, pp. 167- 182 ,(2005) , 10.1016/J.JNCA.2004.01.003
Jingwen Tian, Meijuan Gao, Network Intrusion Detection Method Based on High Speed and Precise Genetic Algorithm Neural Network international conference on networks. ,vol. 2, pp. 619- 622 ,(2009) , 10.1109/NSWCTC.2009.228
Guan Xiaoqing, Guo Hebin, Chen Luyi, Network intrusion detection method based on Agent and SVM ieee international conference on information management and engineering. pp. 399- 402 ,(2010) , 10.1109/ICIME.2010.5477694
Guang-Bin Huang, Hongming Zhou, Xiaojian Ding, Rui Zhang, Extreme Learning Machine for Regression and Multiclass Classification systems man and cybernetics. ,vol. 42, pp. 513- 529 ,(2012) , 10.1109/TSMCB.2011.2168604
Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, Ali A. Ghorbani, A detailed analysis of the KDD CUP 99 data set computational intelligence and security. pp. 53- 58 ,(2009) , 10.1109/CISDA.2009.5356528
L. Li, G. Lee, DDoS attack detection and wavelets international conference on computer communications and networks. pp. 421- 427 ,(2003) , 10.1109/ICCCN.2003.1284203
Farzaneh Izak Shiri, Bharanidharan Shanmugam, Norbik Bashah Idris, None, A parallel technique for improving the performance of signature-based network intrusion detection system ieee international conference on communication software and networks. pp. 692- 696 ,(2011) , 10.1109/ICCSN.2011.6014986
Guang-Bin Huang, Qin-Yu Zhu, Chee-Kheong Siew, Extreme learning machine: a new learning scheme of feedforward neural networks international joint conference on neural network. ,vol. 2, pp. 985- 990 ,(2004) , 10.1109/IJCNN.2004.1380068
R.A. Kemmerer, G. Vigna, Intrusion detection: a brief history and overview IEEE Computer. ,vol. 35, pp. 27- 30 ,(2002) , 10.1109/MC.2002.1012428