Improving Performance of Classification Intrusion Detection Model by Weighted Extreme Learning Using Behavior Analysis of the Attack

被引:0
|
作者
Intarasothonchun, Silada [1 ]
Srimuang, Worachai [1 ]
机构
[1] Khon Kaen Univ, Fac Sci, Dept Comp Sci, Hardware Human Interface & Commun Comm Lab H2I, Khon Kaen 40002, Thailand
关键词
Intrusion Detection; Weighted ELM; Trade-off Constant C; behavior analysis; MACHINE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research was aimed to develop classification intrusion detection model by Weighted ELM which presented in 181, bringing analysis of 42 attributes to find the ones related to each format of attack, remaining only 13 attributes which were chosen to use in Weighted ELM working system in order to classify various attack formats and compared to experimental result with SVM+GA [7] and Weighted ELM techniques [8]. The result showed that New Weighted ELM was quite accurate in classifying every format of attack, which the presented working system of the method used RBF Kernel Activation Function and defined Trade-off Constant C value at 2(2) = 4, giving validity value to be Normal = 99.21%, DoS = 99.97%, U2R = 99.59%, R2L - 99.04% and Probing Attack = 99.13%, average validity value was at 99.39%. Comparing to Weighted ELM in [8], found that, the presented method could improve the effectiveness of the former method enable to more classify R2L from 93.94% to 99.04%, and from 96.94% to 99.13% for Probing Attack meanwhile DoS and U2R had lower effectiveness, yet there was resemble effectiveness.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Classification Model of Network Intrusion using Weighted Extreme Learning Machine
    Srimuang, Worachai
    Intarasothonchun, Silada
    [J]. PROCEEDINGS OF THE 2015 12TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2015, : 190 - 194
  • [2] NETWORK INTRUSION DETECTION SYSTEM USING ATTACK BEHAVIOR CLASSIFICATION
    Al-Jarrah, Omar
    Arafat, Ahmad
    [J]. 2014 5TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2014,
  • [3] Attack classification of an intrusion detection system using deep learning and
    Novaria Kunang, Yesi
    Nurmaini, Siti
    Stiawan, Deris
    Suprapto, Bhakti Yudho
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [4] Improvement of the Classification Performance of an Intrusion Detection Model for Rare and Unknown Attack Traffic
    Han, Sangsoo
    Kim, Youngwon
    Lee, Soojin
    [J]. ELECTRONICS, 2021, 10 (18)
  • [5] Classification of Attack Types for Intrusion Detection Systems using a Machine Learning Algorithm
    Park, Kinam
    Song, Youngrok
    Cheong, Yun-Gyung
    [J]. 2018 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2018), 2018, : 282 - 286
  • [6] Intrusion Detection Using Krill Herd Optimization Based Weighted Extreme Learning Machine
    Kaliraj, P.
    Subramani, B.
    [J]. JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2024, 15 (01) : 147 - 154
  • [7] Intrusion Attack Detection Using Firefly Optimization Algorithm and Ensemble Classification Model
    Rekha Gangula
    Murali Mohan Vutukuru
    M. Ranjeeth Kumar
    [J]. Wireless Personal Communications, 2023, 132 : 1899 - 1916
  • [8] Intrusion Attack Detection Using Firefly Optimization Algorithm and Ensemble Classification Model
    Gangula, Rekha
    Vutukuru, Murali Mohan
    Kumar, M. Ranjeeth
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (03) : 1899 - 1916
  • [9] Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning
    Ayub, Md Ahsan
    Johnson, William A.
    Talbert, Douglas A.
    Siraj, Ambareen
    [J]. 2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, : 324 - 329
  • [10] Using vulnerability analysis to model attack scenario for collaborative intrusion detection
    Liu, Xuejiao
    Xiao, Debao
    [J]. 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1273 - 1277