Skip to main content
Log in

Quantum beetle swarm algorithm optimized extreme learning machine for intrusion detection

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Because of the low accuracy in intrusion detection, a model of extreme learning machine based on the optimization of quantum beetle swarm algorithm is proposed. First of all, this paper proposes a quantum beetle swarm optimization algorithm, which introduces quantum mechanics and combines the advantages of beetle antennae search and particle swarm optimization. In this way, the individual can learn both their own experience and group experience, which enables the beetle to move purposefully and instructively, and improves the convergence performance of the algorithm. In extreme learning machine, it is more difficult to solve the problem in high-dimensional data. This paper proposed an improved extreme learning machine that uses the least squares QR algorithm to decompose the matrix, which can reduce the computational complexity of the traditional extreme learning machine. The improved extreme learning machine model optimized by quantum beetle swarm optimization algorithm is applied to intrusion detection, and the simulation results show that the model proposed in this paper can significantly improve detection accuracy and increase convergence rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Anderson, J.P.: Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company (1980)

  2. Bronte, R., Shahriar, H., Haddad, H.M.: A signature-based intrusion detection system for web applications based on genetic algorithm. In: Proceedings of the 9th International Conference on Security of Information and Networks, pp. 32–39 (2016)

  3. Nikolova, E., Jecheva, V.: Some similarity coefficients and application of data mining techniques to the anomaly-based ids. Telecommun. Syst. 50(2), 127–135 (2012)

    Article  Google Scholar 

  4. Pradhan, M., Pradhan, S.K., Sahu, S.K.: Anomaly detection using artificial neural network. Int. J. Eng. Sci. Emerg. Technol. 2(1), 29–36 (2012)

    Google Scholar 

  5. Liang, C., Li, C.H., Zhou, L.E.: A PCA-BP neural network-based intrusion detection method. J. Air Eng. Univ. (Nat. Sci. Edit.) 17(6), 93–98 (2016)

    Google Scholar 

  6. Shen, X., Wang, L., Han, D.J.: Application of BP neural network optimized by artificial bee colony in intrusion detection. Comput. Eng. 42(2), 190–194 (2016)

    Google Scholar 

  7. Cai, X, Ning, X, Chen, X: Model of intrusion detection based on rough sets and BP neural network. Comput. Simul. 28(11), 107–110 (2011)

  8. Huang, G., Song, S., Gupta, J.N.D., Wu, C.: Semi-supervised and unsupervised extreme learning machines. IEEE Trans. Cybern. 44(12), 2405–2417 (2014)

    Article  Google Scholar 

  9. Xu, R., Liang, X., Qi, J.S., Li, Z.Y., Zhang, S.S.: Advances and trends in extreme learning machine. Chin. J. Comput. 42(07), 1640–1670 (2019)

    Google Scholar 

  10. Yan, K., Ji, Z., Huijuan, L., Huang, J., Shen, W., Xue, Yu.: Fast and accurate classification of time series data using extended ELM: application in fault diagnosis of air handling units. IEEE Trans. Syst. Man Cybern. Syst. 49(7), 1349–1356 (2017)

    Article  Google Scholar 

  11. Geng, Z.Q., Zhao, S.S., Tao, G.C., Han, Y.M.: Early warning modeling and analysis based on analytic hierarchy process integrated extreme learning machine (AHP-ELM): application to food safety. Food Control 78, 33–42 (2017)

    Article  Google Scholar 

  12. Sun, Z.-L., Wang, H., Lau, W.-S., Seet, G., Wang, D.: Application of BW-ELM model on traffic sign recognition. Neurocomputing 128, 153–159 (2014)

    Article  Google Scholar 

  13. Zidan, M., Abdel-Aty, A.-H., Nguyen, D.M., Mohamed, A.S.A., Al-Sbou, Y., Eleuch, Y., Abdel-Aty, M.: A quantum algorithm based on entanglement measure for classifying Boolean multivariate function into novel hidden classes. Results Phys 15, 102549 (2019)

    Article  Google Scholar 

  14. Zidan, M., Abdel-Aty, A.-H., Younes, A., Zanaty, E., El-Khayat, I., Abdel-Aty, M.: A novel algorithm based on entanglement measurement for improving speed of quantum algorithms. Appl Math Inf Sci 12, 265–269 (2018)

    Article  MathSciNet  Google Scholar 

  15. Wang, H-W., Xue, Y-J., Ma, Y-L., Hua, N., Ma, H-Y.: Determination of quantum toric error correction code threshold using convolutional neural network decoders. Chin. Phys. B (2021). https://doi.org/10.1088/1674-1056/ac11e3

  16. Liu, Z., Zhang, W., Wang, Z.: Optimal planning of charging station for electric vehicle based on quantum PSO algorithm. Zhongguo Dianji Gongcheng Xuebao (Proc. Chin. Soc. Electr. Eng.) 32, 39–45 (2012)

    Google Scholar 

  17. Feng, Z.K., Liao, S.L., Niu, W.J., Shen, J.J., Cheng, C.T., Li, Z.H.: Improved quantum-behaved particle swarm optimization and its application in optimal operation of hydropower stations. Adv. Water Sci. 26, 413–422 (2015)

    Google Scholar 

  18. Fu-you, F.A.N., Guo-wu, Y.A.N.G., Qian-qi, L.E., Feng-mao, L.V., Chao, Z.H.A.O.: Optimized coverage algorithm of wireless video sensor network based on quantum genetic algorithm. J. Commun. 36(6), 94 (2015)

    Google Scholar 

  19. Jiang, X., Li, S.: Bas: beetle antennae search algorithm for optimization problems. arXiv preprint arXiv:1710.10724 (2017)

  20. Paige, C.C., Saunders, C.C.: LSQR: an algorithm for sparse linear equations and sparse least squares. ACM Trans. Math. Softw. (TOMS) 8(1), 43–71 (1982)

    Article  MathSciNet  Google Scholar 

  21. Golub, G., Kahan, W.: Calculating the singular values and pseudo-inverse of a matrix. J. Soc. Ind. Appl. Math. Ser. B Numer. Anal. 2(2), 205–224 (1965)

    Article  MathSciNet  Google Scholar 

  22. Sun, J., Feng, B., Xu, W.: Particle swarm optimization with particles having quantum behavior. In: Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No. 04TH8753), vol. 1, pp. 325–331. IEEE (2004)

  23. Yang, S., Wang, M., et al.: A quantum particle swarm optimization. In: Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No. 04TH8753), vol. 1, pp. 320–324. IEEE (2004)

  24. Han, C., Lv, Y., Yang, D., Hao, Y.: An intrusion detection system based on neural network. In: 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), pp. 2018–2021. IEEE (2011)

  25. Devaraju, S., Ramakrishnan, S.: Performance comparison for intrusion detection system using neural network with KDD dataset. ICTACT J. Soft Comput. 4(3) 743–752 (2014)

  26. De Gregorio, M., Giordano, M.: An experimental evaluation of weightless neural networks for multi-class classification. Appl. Soft Comput. 72, 338–354 (2018)

    Article  Google Scholar 

  27. Chang, C.-C., Lin, C.-J.: Libsvm: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 1–27 (2011)

    Article  Google Scholar 

  28. Hühn, J., Hüllermeier, E.: Furia: an algorithm for unordered fuzzy rule induction. Data Min. Knowl. Discov. 19(3), 293–319 (2009)

    Article  MathSciNet  Google Scholar 

  29. Ustebay, S., Turgut, Z., Aydin, M.A: Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), pp. 71–76. IEEE (2018)

  30. Yulianto, A., Sukarno, P., Suwastika, N.A.: Improving adaboost-based intrusion detection system (IDS) performance on CIC IDS 2017 dataset. J. Phys. Conf. Ser. 1192, 012018 (2019)

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by the National Natural Science Foundation of China (Nos. 61772295, 61572270, and 61173056), the PHD foundation of Chongqing Normal University 576 (No. 19XLB003), the Science and Technology Research Program of Chongqing Municipal Education Commission (Grant No. KJZD-M202000501), Chongqing Technology Innovation and application devel opment special general project (cstc2020jscx-lyjsAX0002) and Shandong Technology Innovation Guidance Program under Grant 2020LYXZ023.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yumin Dong.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dong, Y., Hu, W., Zhang, J. et al. Quantum beetle swarm algorithm optimized extreme learning machine for intrusion detection. Quantum Inf Process 21, 9 (2022). https://doi.org/10.1007/s11128-021-03311-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-021-03311-w

Keywords

Navigation