Skip to main content

Extreme Learning Machines for Intrusion Detection Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7666))

Abstract

Information is a powerful tool that can be used as a competitive advantage to increase market shares, competitiveness and keep products up-to-date. Protecting the information is a difficult task; intrusion detection systems is one of the tools of great importance for the protection of computer network infrastructures. IDSs (Intrusion Detection Systems) are tools that help users and network administrators to keep safe from intruders and attacks of various natures. Machine learning techniques are one of the most popular techniques for IDSs proposed and investigated in the literature. This paper focuses on the use of ELM (Extreme Learning Machine) and OS-ELM (Online Sequential ELM) techniques applied to IDSs. Some features of these methods that motivate their use for building IDSs are: (i) easy assignment of parameters; (ii) good generalization; and (iii) fast and online training. The results show that the methods can be easily applied to a huge amount of data without a significant generalization loss.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, J.P.: Computer security threat monitoring and surveillance. In: Fort Washington, Technical relatory (1980)

    Google Scholar 

  2. Huang, G.-B., Zhou, H., Ding, X., Zhang, R.: Extreme learning machine for regression and multiclass classification. IEEE Transactions on Systems, Man, and Cybernetics 42, 513–519 (2012)

    Article  Google Scholar 

  3. Huang, G.-B., Zhu, Q.-Y., Siew, C.-K.: Extreme learning machine: a new learning scheme of feedforward neural networks. In: Proceeding of International Joint Conference on Neural Networks, vol. 2, pp. 985–990. IEEE (2004)

    Google Scholar 

  4. Kemmerer, R.A., Vigna, G.: Intrusion detection: a brief history and overview. Computer 35, 27–30 (2002)

    Article  Google Scholar 

  5. Li, L., Lee, G.: Ddos attack detection and wavelets. In: Proceedings of The 12th International Conference on Computer Communications and Networks, ICCCN 2003, pp. 421–427. IEEE (2003)

    Google Scholar 

  6. Liang, N.Y., Huang, G.B., Saratchandran, P., Sundararajan, N.: A fast and accurate online sequential learning algorithm for feedforward networks. IEEE Transactions on Neural Networks 17, 1411–1423 (2006)

    Article  Google Scholar 

  7. Mukkamala, S., Sung, A.H., Abraham, A.: Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications 28, 167, Science Direct (2005)

    Google Scholar 

  8. Shiri, F.I., Shanmugam, B., Idri, N.B.: A parallel technique for improving the performance of signature-based network intrusion detection system. In: International Conference on Communication Software and Networks, pp. 692–696. IEEE (2011)

    Google Scholar 

  9. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: IEEE 2009 Symposium on computational Intelligence in Security and Defense Applications (CISDA 2009), pp. 1–6. IEEE (2009)

    Google Scholar 

  10. Tian, J., Gao, M.: Network intrusion detection method based on high speed and precise genetic algorithm neural network. In: International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 2, pp. 619–622. IEEE (2009)

    Google Scholar 

  11. Tian, J., Gao, M., Zhang, F.: Network intrusion detection method based on radial basic function neural network. In: International Conference on E-Business and Information System Security (EBISS 2009), pp. 1–4. IEEE (2009)

    Google Scholar 

  12. Xiaoqing, G., Hebin, G., Luyi, C.: Network intrusion detection method based on agent and svm. In: The 2nd IEEE International Conference on Information Management and Engineering, pp. 399–402. IEEE (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

de Farias, G.P.M., de Oliveira, A.L.I., Cabral, G.G. (2012). Extreme Learning Machines for Intrusion Detection Systems. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds) Neural Information Processing. ICONIP 2012. Lecture Notes in Computer Science, vol 7666. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34478-7_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34478-7_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34477-0

  • Online ISBN: 978-3-642-34478-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics