Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Network intrusion detection using equality constrained-optimization-based extreme learning machines - 2018

Network Intrusion Detection Using Equality Constrained-Optimization-Based Extreme Learning Machines

Research Paper on Network Intrusion Detection Using Equality Constrained-Optimization-Based Extreme Learning Machines

Research Area:  Machine Learning

Abstract:

Since Internet is so popular and prevailing in human life, network security has become a very important issue and attracted a lot of study and practice. To detect or prevent network attacks, a network intrusion detection (NID) system may be equipped with machine learning algorithms to achieve better accuracy and faster detection speed. Applying machine learning has another major advantage that expert knowledge is not needed as much as the black or white list model. Extreme learning machines (ELMs) are single-layer artificial neural networks not required to be iteratively trained. Therefore, their learning speed is fast, and speed is crucial in the success of network intrusion detection systems for them to take prompt, effective defending reactions. Huang et al. proposed the equality constrained-optimization-based ELM (C-ELM) which is a modified version of ELM by integrating with the features of least squares support vector machines. In this paper, we apply C-ELM to network intrusion detection. An adaptively incremental learning strategy is proposed to derive the optimal number of hidden neurons. The optimization criteria and a way of adaptively increasing hidden neurons with binary search are developed. A broad number of experiments have been done and the results show that our proposed approach is effective in building models with good attack detection rates and fast learning speed.

Keywords:  
Network Intrusion Detection
Equality Constrained-Optimization
Extreme Learning Machines
Machine Learning
Deep Learning

Author(s) Name:  Cheng-Ru Wang,Rong-Fang Xu,Shie-Jue Lee,Chie-Hong Lee

Journal name:  Knowledge-Based Systems

Conferrence name:  

Publisher name:  ELSEVIER

DOI:  10.1016/j.knosys.2018.02.015

Volume Information:  Volume 147, 1 May 2018, Pages 68-80