Intrusion detection algorithom based on transfer extreme learning machine

被引:1
|
作者
Wang, Kunpeng [1 ]
Li, Jingmei [1 ]
Wu, Weifei [2 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Heilongjiang, Peoples R China
[2] Second Acad China Aerosp Sci & Ind Corp, Beijing Inst Remote Sensing Equipment, Beijing, Peoples R China
关键词
Transfer learning; intrusion detection; extreme learning machine; NETWORKS;
D O I
10.3233/IDA-216475
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection can effectively detect malicious attacks in computer networks, which has always been a research hotspot in field of network security. At present, most of the existing intrusion detection methods are based on traditional machine learning algorithms. These methods need enough available intrusion detection training samples, training and test data meet the assumption of independent and identically distributed, at the same time have the disadvantages of low detection accuracy for small samples and new emerging attacks, slow speed of establishment model and high cost. To solve the above problems, this paper proposes an intrusion detection algorithm-TrELM based on transfer learning and extreme machine. TrELM is no longer limited by the assumptions of traditional machine learning. TrELM utilizes the idea of transfer learning to transfer a large number of historical intrusion detection samples related to target domain to target domain with a small number of intrusion detection samples. With the existing historical knowledge, quickly build a high-quality target learning model to effectively improve the detection effect and efficiency of small samples and new emerging intrusion detection behaviors. Experiments are carried out on NSL-KDD, KDD99 and ISCX2012 data sets. The experimental results show that the algorithm can improve the detection accuracy, especially for unknown and small samples.
引用
下载
收藏
页码:463 / 482
页数:20
相关论文
共 50 条
  • [41] Machine learning-based intrusion detection algorithms
    Tang, Hua
    Cao, Zhuolin
    Journal of Computational Information Systems, 2009, 5 (06): : 1825 - 1831
  • [42] Intrusion detection with autoencoder based deep learning machine
    Kaynar, Oguz
    Yuksek, Ahmet Gurkan
    Gormez, Yasin
    Isik, Yunus Emre
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [43] Intrusion Detection Technology Based on Machine Learning Method
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5165 - 5168
  • [44] INTRUSION DETECTION BASED ON MACHINE LEARNING AND FEATURE SELECTION
    Alaoui, Souad
    El Gonnouni, Amina
    Lyhyaoui, Abdelouahid
    MENDEL 2011 - 17TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING, 2011, : 199 - 206
  • [45] A Hybrid Approach for Intrusion Detection Based on Machine Learning
    Singh, Rohit
    Kalra, Mala
    Solanki, Shano
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2019), 2019, : 187 - 192
  • [46] Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection
    Ahmad, Iftikhar
    Basheri, Mohammad
    Iqbal, Muhammad Javed
    Rahim, Aneel
    IEEE ACCESS, 2018, 6 : 33789 - 33795
  • [47] Research on Network Intrusion Detection Based on Incremental Extreme Learning Machine and Adaptive Principal Component Analysis
    Gao, Jianlei
    Chai, Senchun
    Zhang, Baihai
    Xia, Yuanqing
    ENERGIES, 2019, 12 (07)
  • [48] Hybrid wrapper feature selection method based on genetic algorithm and extreme learning machine for intrusion detection
    Maseno, Elijah M.
    Wang, Zenghui
    JOURNAL OF BIG DATA, 2024, 11 (01)
  • [49] Intrusion Detection Based on Self-adaptive Differential Evolution Extreme Learning Machine with Gaussian Kernel
    Ku, Junhua
    Zheng, Bing
    PARALLEL ARCHITECTURE, ALGORITHM AND PROGRAMMING, PAAP 2017, 2017, 729 : 13 - 24
  • [50] Hybrid wrapper feature selection method based on genetic algorithm and extreme learning machine for intrusion detection
    Elijah M. Maseno
    Zenghui Wang
    Journal of Big Data, 11