Intrusion detection algorithom based on transfer extreme learning machine

被引:1
|
作者
Wang, Kunpeng [1 ]
Li, Jingmei [1 ]
Wu, Weifei [2 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Heilongjiang, Peoples R China
[2] Second Acad China Aerosp Sci & Ind Corp, Beijing Inst Remote Sensing Equipment, Beijing, Peoples R China
关键词
Transfer learning; intrusion detection; extreme learning machine; NETWORKS;
D O I
10.3233/IDA-216475
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection can effectively detect malicious attacks in computer networks, which has always been a research hotspot in field of network security. At present, most of the existing intrusion detection methods are based on traditional machine learning algorithms. These methods need enough available intrusion detection training samples, training and test data meet the assumption of independent and identically distributed, at the same time have the disadvantages of low detection accuracy for small samples and new emerging attacks, slow speed of establishment model and high cost. To solve the above problems, this paper proposes an intrusion detection algorithm-TrELM based on transfer learning and extreme machine. TrELM is no longer limited by the assumptions of traditional machine learning. TrELM utilizes the idea of transfer learning to transfer a large number of historical intrusion detection samples related to target domain to target domain with a small number of intrusion detection samples. With the existing historical knowledge, quickly build a high-quality target learning model to effectively improve the detection effect and efficiency of small samples and new emerging intrusion detection behaviors. Experiments are carried out on NSL-KDD, KDD99 and ISCX2012 data sets. The experimental results show that the algorithm can improve the detection accuracy, especially for unknown and small samples.
引用
下载
收藏
页码:463 / 482
页数:20
相关论文
共 50 条
  • [31] A hierarchical intrusion detection system based on extreme learning machine and nature-inspired optimization
    Alzaqebah, Abdullah
    Aljarah, Ibrahim
    Al-Kadi, Omar
    COMPUTERS & SECURITY, 2023, 124
  • [32] A Hybrid PSO-BPSO Based Kernel Extreme Learning Machine Model for Intrusion Detection
    Shen, Yanping
    Zheng, Kangfeng
    Wu, Chunhua
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2022, 18 (01): : 146 - 158
  • [33] A new hybrid teaching learning based Optimization -Extreme learning Machine model based Intrusion-Detection system
    Qahatan Alsudani M.
    Abbdal Reflish S.H.
    Moorthy K.
    Mundher Adnan M.
    Mater. Today Proc., 2023, (2701-2705): : 2701 - 2705
  • [34] Extreme Learning Machines for Intrusion Detection
    Cheng, Chi
    Tay, Wee Peng
    Huang, Guang-Bin
    2012 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2012,
  • [35] Quantum beetle swarm algorithm optimized extreme learning machine for intrusion detection
    Dong, Yumin
    Hu, Wanbin
    Zhang, Jinlei
    Chen, Min
    Liao, Wei
    Chen, Zhengquan
    QUANTUM INFORMATION PROCESSING, 2022, 21 (01)
  • [36] Maximizing intrusion detection efficiency for IoT networks using extreme learning machine
    Altamimi S.
    Abu Al-Haija Q.
    Discover Internet of Things, 2024, 4 (01):
  • [37] IoT Intrusion Detection System Based on Machine Learning
    Xu, Bayi
    Sun, Lei
    Mao, Xiuqing
    Ding, Ruiyang
    Liu, Chengwei
    ELECTRONICS, 2023, 12 (20)
  • [38] Quantum beetle swarm algorithm optimized extreme learning machine for intrusion detection
    Yumin Dong
    Wanbin Hu
    Jinlei Zhang
    Min Chen
    Wei Liao
    Zhengquan Chen
    Quantum Information Processing, 2022, 21
  • [39] Machine learning based intrusion detection system for IoMT
    Kulshrestha, Priyesh
    Vijay Kumar, T. V.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (05) : 1802 - 1814
  • [40] Anomaly Based Intrusion Detection for IoT with Machine Learning
    Shaver, Addison
    Liu, Zhipeng
    Thapa, Niraj
    Roy, Kaushik
    Gokaraju, Balakrishna
    Yuan, Xiaohon
    2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,