skip to main content
10.1145/3437378.3437390acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacswConference Proceedingsconference-collections
research-article

A Comparative Study of ML-ELM and DNN for Intrusion Detection

Published: 01 February 2021 Publication History

Abstract

Intrusion detection remains one of the critical research issues in network security. Many machine learning algorithms have been proposed to develop intrusion detection systems, which can categorize network traffic into normal and anomalous classes. The multilayer extreme learning machine (ML-ELM) and the deep neural network (DNN) are two machine learning algorithms based on different theories/concepts that use the same multilayer architecture. In this paper, a comparative study is performed to shed light on the selection between these two algorithms with the same architecture in intrusion detection applications. The study explores the performance of the ML-ELM and DNN algorithms under similar parameter settings. With in-depth analysis and discussions, the limitations and advantages of each algorithm are outlined. In addition, the performance trend of each algorithm with increasing parameter values is studied.

References

[1]
Deep-Learning-for-IDS. Retrieved Access date: 01/07/2020, from https://github.com/locnguyen21/Deep-Learning-for-IDS.
[2]
NSL-KDD. Retrieved 01/07/2020, from https://www.unb.ca/cic/datasets/nsl.html.
[3]
Source Codes of ML-ELM. Retrieved Access date: 30/09/2018, from http://www.ntu.edu.sg/home/egbhuang/elm_codes.html.
[4]
Wathiq Laftah Al-Yaseen, Zulaiha Ali Othman and Mohd Zakree Ahmad Nazri. 2017. Multi-Level Hybrid Support Vector Machine and Extreme Learning Machine Based on Modified K-Means for Intrusion Detection System. Expert Systems with Applications 67, 296-303.
[5]
Kasun Amarasinghe and Milos Manic. 2018. Improving User Trust on Deep Neural Networks Based Intrusion Detection Systems. In Proceedings of IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 3262-3268.
[6]
Xingshuo An, Xianwei Zhou, Xing Lü, Fuhong Lin and Lei Yang. 2018. Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and Mec. Wireless Communications and Mobile Computing 2018.
[7]
Amira Sayed A Aziz, EL Sanaa and Aboul Ella Hassanien. 2017. Comparison of Classification Techniques Applied for Network Intrusion Detection and Classification. Journal of Applied Logic 24, 109-118.
[8]
Ilyas Benmessahel, Kun Xie and Mouna Chellal. 2018. New Improved Training for Deep Neural Networks Based on Intrusion Detection System. In Proceedings of IOP Conference Series Materials Science and Engineering.
[9]
Raouf Boutaba, Mohammad A Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar, Felipe Estrada-Solano and Oscar M Caicedo. 2018. A Comprehensive Survey on Machine Learning for Networking: Evolution, Applications and Research Opportunities. Journal of Internet Services and Applications 9, 1, 16.
[10]
Chi Cheng, Wee Peng Tay and Guang-Bin Huang. 2012. Extreme Learning Machines for Intrusion Detection. In Proceedings of The 2012 International joint conference on neural networks (IJCNN). IEEE, 1-8.
[11]
Sang-Hyun Choi and Hee-Su Chae. 2014. Feature Selection Using Attribute Ratio in Nsl-Kdd Data. In Proceedings of International Conference Data mining, Civil and Mechanical Engineering (ICDMSME’2014), Bali (Indonesia), Fecb. 4-5.
[12]
Shifei Ding, Xinzheng Xu and Ru Nie. 2014. Extreme Learning Machine and Its Applications. Neural Computing and Applications 25, 3-4, 549-556.
[13]
Jianlei Gao, Senchun Chai, Chen Zhang, Baihai Zhang and Lingguo Cui. 2019. A Novel Intrusion Detection System Based on Extreme Machine Learning and Multi-Voting Technology. In Proceedings of 2019 Chinese Control Conference (CCC). IEEE, 8909-8914.
[14]
Pedro Garcia-Teodoro, Jesus Diaz-Verdejo, Gabriel Maciá-Fernández and Enrique Vázquez. 2009. Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges. computers & security 28, 1-2, 18-28.
[15]
Jamal Ghasemi, Jamal Esmaily and Reza Moradinezhad. 2020. Intrusion Detection System Using an Optimized Kernel Extreme Learning Machine and Efficient Features. Sādhanā 45, 1, 1-9.
[16]
Guang-Bin Huang, Lei Chen and Chee Kheong Siew. 2006. Universal Approximation Using Incremental Constructive Feedforward Networks with Random Hidden Nodes. IEEE Trans. Neural Networks 17, 4, 879-892.
[17]
Guang-Bin Huang, Qin-Yu Zhu and Chee-Kheong Siew. 2004. Extreme Learning Machine: A New Learning Scheme of Feedforward Neural Networks. In Proceedings of Neural Networks, 2004. Proceedings. 2004 IEEE International Joint Conference on. IEEE, 985-990.
[18]
M.N. Johnstone and M. Peacock. 2020. Seven Pitfalls of Using Data Science in Cybersecurity. In Data Science in Cybersecurity and Cyberthreat Intelligence, L. F. Sikos and K.-K. Choo, R. Eds. Springer, Cham, Switzerland. http://dx.doi.org/10.1007/978-3-030-38788-4_6
[19]
Min-Ju Kang and Je-Won Kang. 2016. A Novel Intrusion Detection Method Using Deep Neural Network for in-Vehicle Network Security. In Proceedings of 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE, 1-5.
[20]
Liyanaarachchi Lekamalage Chamara Kasun, Hongming Zhou, Guang-Bin Huang and Chi Man Vong. 2013. Representational Learning with Extreme Learning Machine for Big Data. IEEE Intell. Syst. 28, 6, 31-34.
[21]
Jin Kim, Nara Shin, Seung Yeon Jo and Sang Hyun Kim. 2017. Method of Intrusion Detection Using Deep Neural Network. In Proceedings of 2017 IEEE International Conference on Big Data and Smart Computing (BigComp). IEEE, 313-316.
[22]
Yuan Lan, Yeng Chai Soh and Guang-Bin Huang. 2010. Two-Stage Extreme Learning Machine for Regression. Neurocomputing 73, 16-18, 3028-3038.
[23]
Nour Moustafa and Jill Slay. 2015. Unsw-Nb15: A Comprehensive Data Set for Network Intrusion Detection Systems (Unsw-Nb15 Network Data Set). In Proceedings of 2015 military communications and information systems conference (MilCIS). IEEE, 1-6.
[24]
Mrutyunjaya Panda, Ajith Abraham and Manas Ranjan Patra. 2012. A Hybrid Intelligent Approach for Network Intrusion Detection. Procedia Engineering 30, 1-9.
[25]
Sasanka Potluri and Christian Diedrich. 2016. Accelerated Deep Neural Networks for Enhanced Intrusion Detection System. In Proceedings of 2016 IEEE 21st international conference on emerging technologies and factory automation (ETFA). IEEE, 1-8.
[26]
Jiexiong Tang, Chenwei Deng and Guang-Bin Huang. 2016. Extreme Learning Machine for Multilayer Perceptron. IEEE Trans. Neural Netw. Learn. Syst. 27, 4, 809-821.
[27]
Tuan A Tang, Lotfi Mhamdi, Des McLernon, Syed Ali Raza Zaidi and Mounir Ghogho. 2016. Deep Learning Approach for Network Intrusion Detection in Software Defined Networking. In Proceedings of 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE, 258-263.
[28]
R Vinayakumar, Mamoun Alazab, KP Soman, Prabaharan Poornachandran, Ameer Al-Nemrat and Sitalakshmi Venkatraman. 2019. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access 7, 41525-41550.
[29]
Junlong Xiang, Magnus Westerlund, Dušan Sovilj and Göran Pulkkis. 2014. Using Extreme Learning Machine for Intrusion Detection in a Big Data Environment. In Proceedings of Proceedings of the 2014 workshop on artificial intelligent and security workshop. 73-82.
[30]
Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Jucheng Yang and Craig Valli. 2019. Securing Deep Learning Based Edge Finger-Vein Biometrics with Binary Decision Diagram. IEEE Trans. Ind. Informat. 15, 7, 11.
[31]
Yanqing Yang, Kangfeng Zheng, Chunhua Wu and Yixian Yang. 2019. Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational Autoencoder and Deep Neural Network. Sensors 19, 11, 2528.
[32]
Chuanlong Yin, Yuefei Zhu, Jinlong Fei and Xinzheng He. 2017. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks. Ieee Access 5, 21954-21961.
[33]
Haiyang Yu, Jian Wang and Xiaoying Sun. 2019. Surveillance Video Online Prediction Using Multilayer Elm with Object Principal Trajectory. Signal, Image and Video Processing 13, 6, 1243-1251.
[34]
Wenjie Zhang, Dezhi Han, Kuan-Ching Li and Francisco Isidro Massetto. 2020. Wireless Sensor Network Intrusion Detection System Based on Mk-Elm. Soft Computing, 1-14.

Cited By

View all
  • (2024)Analysis of Extreme Learning Machines (ELMs) for intelligent intrusion detection systems: A surveyExpert Systems with Applications10.1016/j.eswa.2024.124317253(124317)Online publication date: Nov-2024
  • (2022)Network Forensics in the Era of Artificial IntelligenceExplainable Artificial Intelligence for Cyber Security10.1007/978-3-030-96630-0_8(171-190)Online publication date: 19-Apr-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSW '21: Proceedings of the 2021 Australasian Computer Science Week Multiconference
February 2021
211 pages
ISBN:9781450389563
DOI:10.1145/3437378
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 February 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Intrusion detection system
  2. deep neural network
  3. detection accuracy
  4. extreme learning machine

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Cyber Security Research Centre Limited

Conference

ACSW '21

Acceptance Rates

Overall Acceptance Rate 61 of 141 submissions, 43%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)1
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Analysis of Extreme Learning Machines (ELMs) for intelligent intrusion detection systems: A surveyExpert Systems with Applications10.1016/j.eswa.2024.124317253(124317)Online publication date: Nov-2024
  • (2022)Network Forensics in the Era of Artificial IntelligenceExplainable Artificial Intelligence for Cyber Security10.1007/978-3-030-96630-0_8(171-190)Online publication date: 19-Apr-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media