Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Bhuyan, D. Bhattacharyya, J. Kalita (2014)
Network Anomaly Detection: Methods, Systems and ToolsIEEE Communications Surveys & Tutorials, 16
Kuai Xu, Zhi-Li Zhang, S. Bhattacharyya (2008)
Internet Traffic Behavior Profiling for Network Security MonitoringIEEE/ACM Transactions on Networking, 16
R. Bace, P. Mell (2001)
NIST Special Publication on Intrusion Detection Systems
G. Huang (2015)
What are Extreme Learning Machines? Filling the Gap Between Frank Rosenblatt’s Dream and John von Neumann’s PuzzleCognitive Computation, 7
Anton Akusok, Y. Miché, J. Hegedus, Rui Nian, A. Lendasse (2014)
A Two-Stage Methodology Using K-NN and False-Positive Minimizing ELM for Nominal Data ClassificationCognitive Computation, 6
R Baeza-Yates, B Ribeiro-Neto (1999)
Modern information retrieval, Vol. 463
Y. Liao, V. Vemuri (2002)
Use of K-Nearest Neighbor classifier for intrusion detectionComput. Secur., 21
Shifei Ding, Jian Zhang, Hongjie Jia, Jun Qian (2016)
An Adaptive Density Data Stream Clustering AlgorithmCognitive Computation, 8
S. Gaddam, V. Phoha, K. Balagani (2007)
K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning MethodsIEEE Transactions on Knowledge and Data Engineering, 19
G. Kumar, Krishan Kumar (2013)
Design of an Evolutionary Approach for Intrusion DetectionThe Scientific World Journal, 2013
G. Wang, Jin-Xing Hao, Jian Ma, Lihua Huang (2010)
A new approach to intrusion detection using Artificial Neural Networks and fuzzy clusteringExpert Syst. Appl., 37
Michael Lucas (2010)
Network Flow Analysis
Adel Ammar (2015)
A Decision Tree Classifier for Intrusion Detection Priority TaggingJournal of Computational Chemistry, 03
(1999)
Modern Information Retrieval
Guang-Bin Huang, Nan-Ying Liang, Hai-Jun Rong, P. Saratchandran, N. Sundararajan (2005)
On-Line Sequential Extreme Learning Machine
Chenwei Deng, Shuigen Wang, Zhen Li, G. Huang, Weisi Lin (2019)
Content-Insensitive Blind Image Blurriness Assessment Using Weibull Statistics and Sparse Extreme Learning MachineIEEE Transactions on Systems, Man, and Cybernetics: Systems, 49
S. Lim, A. Jones (2008)
Network Anomaly Detection System: The State of Art of Network Behaviour Analysis2008 International Conference on Convergence and Hybrid Information Technology
Wentao Mao, Mengxue Jiang, Jinwan Wang, Yuan Li (2017)
Online Extreme Learning Machine with Hybrid Sampling Strategy for Sequential Imbalanced DataCognitive Computation, 9
G. Folino, F. Pisani, Pietro Sabatino (2016)
A Distributed Intrusion Detection Framework Based on Evolved Specialized Ensembles of Classifiers
C. Perkins (2010)
IP Mobility Support for IPv4, RevisedRFC, 5944
Radford Neal (2006)
Pattern Recognition and Machine LearningPattern Recognition and Machine Learning
K. Vasan, B Surendiran (2016)
Dimensionality reduction using Principal Component Analysis for network intrusion detectionPerspectives on Science, 8
P. García-Teodoro, J. Verdejo, G. Maciá-Fernández, E. Vázquez (2009)
Anomaly-based network intrusion detection: Techniques, systems and challengesComput. Secur., 28
Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, P. Nanda, R. Liu, Jiankun Hu (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision TechniquesIEEE Transactions on Computers, 64
A Ammar (2015)
Decision tree classifier for intrusion detection priority taggingJ Comput Commun, 3
G. Huang, Q. Zhu, C. Siew (2006)
Extreme learning machine: Theory and applicationsNeurocomputing, 70
A. Patcha, J. Park (2007)
An overview of anomaly detection techniques: Existing solutions and latest technological trendsComput. Networks, 51
Graham Cormode, Flip Korn, S. Muthukrishnan, D. Srivastava (2003)
Finding Hierarchical Heavy Hitters in Data Streams
G. Huang, Lei Chen, C. Siew (2006)
Universal approximation using incremental constructive feedforward networks with random hidden nodesIEEE transactions on neural networks, 17 4
L. Khan, M. Awad, B. Thuraisingham (2007)
A new intrusion detection system using support vector machines and hierarchical clusteringThe VLDB Journal, 16
G. Huang (2014)
An Insight into Extreme Learning Machines: Random Neurons, Random Features and KernelsCognitive Computation, 6
Xinwang Liu, Lei Wang, G. Huang, Jian Zhang, Jianping Yin (2015)
Multiple kernel extreme learning machineNeurocomputing, 149
Xinwang Liu, Lei Wang, Jianping Yin, En Zhu, Jian Zhang (2013)
An Efficient Approach to Integrating Radius Information into Multiple Kernel LearningIEEE Transactions on Cybernetics, 43
W. Yassin, N. Udzir, Zaiton Muda, M. Sulaiman (2013)
Anomaly-based intrusion detection through K-means clustering and naives bayes classification
C. Perkins (2002)
IP Mobility Support for IPv4RFC, 3344
V. Srinivasan, G. Varghese (1998)
Faster IP lookups using controlled prefix expansion
Y. Miché, A. Sorjamaa, P. Bas, O. Simula, C. Jutten, A. Lendasse (2010)
OP-ELM: Optimally Pruned Extreme Learning MachineIEEE Transactions on Neural Networks, 21
Shuigen Wang, Chenwei Deng, Weisi Lin, G. Huang, Baojun Zhao (2017)
NMF-Based Image Quality Assessment Using Extreme Learning MachineIEEE Transactions on Cybernetics, 47
A. Shiravi, H. Shiravi, Mahbod Tavallaee, A. Ghorbani (2012)
Toward developing a systematic approach to generate benchmark datasets for intrusion detectionComput. Secur., 31
G. Gu, Prahlad Fogla, D. Dagon, Wenke Lee, B. Škorić (2006)
Measuring intrusion detection capability: an information-theoretic approach
Graham Cormode, Flip Korn, S. Muthukrishnan, Divesh Srivastava (2003)
Proceedings 2003 VLDB Conference
Recently, with the increased use of network communication, the risk of compromising the information has grown immensely. Intrusions have become more sophisticated and few methods can achieve efficient results while the network behavior constantly changes. This paper proposes an intrusion detection system based on modeling distributions of network statistics and Extreme Learning Machine (ELM) to achieve high detection rates of intrusions. The proposed model aggregates the network traffic at the IP subnetwork level and the distribution of statistics are collected for the most frequent IPv4 addresses encountered as destination. The obtained probability distributions are learned by ELM. This model is evaluated on the ISCX-IDS 2012 dataset, which is collected using a real-time testbed. The model is compared against leading approaches using the same dataset. Experimental results show that the presented method achieves an average detection rate of 91% and a misclassification rate of 9%. The experimental results show that our methods significantly improve the performance of the simple ELM despite a trade-off between performance and time complexity. Furthermore, our methods achieve good performance in comparison with the other few state-of-the-art approaches evaluated on the ISCX-IDS 2012 dataset.
Cognitive Computation – Springer Journals
Published: Jun 5, 2018
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.