Improving Performance of Classification Intrusion Detection Model by Weighted Extreme Learning Using Behavior Analysis of the Attack

被引:0
|
作者
Intarasothonchun, Silada [1 ]
Srimuang, Worachai [1 ]
机构
[1] Khon Kaen Univ, Fac Sci, Dept Comp Sci, Hardware Human Interface & Commun Comm Lab H2I, Khon Kaen 40002, Thailand
关键词
Intrusion Detection; Weighted ELM; Trade-off Constant C; behavior analysis; MACHINE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research was aimed to develop classification intrusion detection model by Weighted ELM which presented in 181, bringing analysis of 42 attributes to find the ones related to each format of attack, remaining only 13 attributes which were chosen to use in Weighted ELM working system in order to classify various attack formats and compared to experimental result with SVM+GA [7] and Weighted ELM techniques [8]. The result showed that New Weighted ELM was quite accurate in classifying every format of attack, which the presented working system of the method used RBF Kernel Activation Function and defined Trade-off Constant C value at 2(2) = 4, giving validity value to be Normal = 99.21%, DoS = 99.97%, U2R = 99.59%, R2L - 99.04% and Probing Attack = 99.13%, average validity value was at 99.39%. Comparing to Weighted ELM in [8], found that, the presented method could improve the effectiveness of the former method enable to more classify R2L from 93.94% to 99.04%, and from 96.94% to 99.13% for Probing Attack meanwhile DoS and U2R had lower effectiveness, yet there was resemble effectiveness.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Improving the Performance of the Snort Intrusion Detection Using Clonal Selection
    Elshafie, Hussein M.
    Mahmoud, Tarek M.
    Ali, Abdelmgeid A.
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMPUTER ENGINEERING (ITCE 2019), 2019, : 104 - 110
  • [32] Performance Analysis of Machine Learning Techniques in Intrusion Detection
    Tungjaturasopon, Praiya
    Piromsopa, Krerk
    PROCEEDINGS OF 2018 VII INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2018), 2018, : 6 - 10
  • [33] Performance Analysis of Machine Learning Classifiers for Intrusion Detection
    Zwane, Skhumbuzo
    Tarwireyi, Paul
    Adigun, Matthew
    2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 538 - 542
  • [34] Performance Analysis Of Machine Learning Techniques In Intrusion Detection
    Kaya, Cetin
    Yildiz, Oktay
    Ay, Sinan
    2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1473 - 1476
  • [35] Comparative performance analysis of classification algorithms for intrusion detection system
    Anbar, Mohammed
    Abdullah, Rosni
    Hasbullah, Iznan H.
    Chong, Yung-Wey
    Elejla, Omar E.
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [36] IDERES: Intrusion detection and response system using machine learning and attack graphs
    Rose, Joseph R.
    Swann, Matthew
    Grammatikakis, Konstantinos P.
    Koufos, Ioannis
    Bendiab, Gueltoum
    Shiaeles, Stavros
    Kolokotronis, Nicholas
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 131
  • [37] Attack classification in network intrusion detection system based on optimization strategy and deep learning methodology
    Ramu, Ch. Kodanda
    Rao, T. Srinivasa
    Rao, E. Uma Shankar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (31) : 75533 - 75555
  • [38] A learning model for intrusion detection using tolerance relation
    Sun, FS
    Tzeng, CH
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 460 - 466
  • [39] Machine Learning Classification Model For Network Based Intrusion Detection System
    Kumar, Sanjay
    Viinikainen, Ari
    Hamalainen, Timo
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 242 - 249
  • [40] Using Classification Techniques for Creation of Predictive Intrusion Detection Model
    Almutairi, Abdulrazaq
    Parish, David
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 223 - 228