Skip to main content

Implement Improved Intrusion Detection System Using State Preserving Extreme Learning Machine (SPELM)

  • Conference paper
  • First Online:
Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018) (ICCBI 2018)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 31))

Included in the following conference series:

  • 1753 Accesses

Abstract

In this contemporary world of computer networks, network security plays a predominant role in enabling a secured network communication infrastructure into existence. In order to enforce a high protection levels against the existing network threats, number of software tools are currently employed. Intrusion Detection Systems (IDS) aims to detect the intruders or anomalies in the computer network architecture. Software model protects the computer networks from unauthorized users by detecting the network intruders at the right time. In this a machine learning classifier is built and trained the model with the NSL-KDD dataset. After training the model, the remaining data-set is tested to detect or classify the attacks into categories like normal or attack. The scholar has built State Preserving Extreme Learning Machine (SPELM) algorithm as machine learning classifier and compared its performance accuracy with the Deep Belief Network (DBN) model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Sultana, A., Jabbar, M.A.: Intelligent network intrusion detection system using data mining techniques. In: 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE (2016)

    Google Scholar 

  • Anderson, J.P.: Computer security threat monitoring and surveillance, Technical report 98-17. James P. Anderson Co., Fort Washington, Pennsylvania, USA, April 1980

    Google Scholar 

  • Obeis, N.T., Bhaya, W.: Review of data mining techniques for malicious detetion. Res. J. Appl. Sci. 11(10), 942–947 (2016)

    Google Scholar 

  • Wang, J.-H., Deng, P.S.: Virus detection using data mining techniques. TAO-Yuar, Taiwan, ROC333 (2003)

    Google Scholar 

  • Ranjan, R., Sahoo, G.: A new clustering approach for anomaly intrusion detection. Int. J. Data Min. Knowl. Manag. Process (IJDKP) (2014)

    Google Scholar 

  • Hall, M.A.: Correlation-based feature selection for discrete and numeric class machine learning. In: International Conference on Machine Learning, pp. 359–366 (2000)

    Google Scholar 

  • Koc, L., Mazzuchi, T.A.: A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier. Expert Syst. Appl. 39, 13492–13500 (2012)

    Article  Google Scholar 

  • Feng, W., Zhang, Q.: Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Gener. Comput. Syst. 37, 27–140 (2014)

    Article  Google Scholar 

  • Kohli, S., Singal, H.: Data analysis with R. IEEE (2014)

    Google Scholar 

  • Alom, M.Z., Bontupalli, V.R., Taha, T.M.: Intrusion detection using deep belief networks. IEEE (2015)

    Google Scholar 

Download references

Acknowledgements

The authors are grateful to acknowledge the support of NSL KDD Data set.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Kunal Singh or K. James Mathai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, K., James Mathai, K. (2020). Implement Improved Intrusion Detection System Using State Preserving Extreme Learning Machine (SPELM). In: Pandian, A.P., Senjyu, T., Islam, S.M.S., Wang, H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24643-3_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24642-6

  • Online ISBN: 978-3-030-24643-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics