Skip to main content

Network Intrusion Detection

  • Conference paper
Proceedings of ELM-2014 Volume 2

Part of the book series: Proceedings in Adaptation, Learning and Optimization ((PALO,volume 4))

Abstract

With the developing of Internet, network intrusion has becoming more and more common.Extreme learning machine (ELM) is an efficient learning algorithm for generalized single hidden layer feed-forward networks. ELM can be used for network intrusion detection.This work introduces a method using extreme learning machine to detect network intrusion. In proposed approach, a classifier is trained and used to classify connections as one of five categories. The experiment data applied is KDD99 data, which is the benchmark data for intrusion detection. In additional, this proposed method is compared against decision tree, neural network and support vector machines .It can be seen that the proposed method which using extreme learning machine has better performance than support vector machines in terms of sensitivity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zaman, S., Karray, F.: Lightweight IDS based on features selection and IDS classification scheme. In: International Conference on Computational Science and Engineering, CSE 2009, vol. 3, pp. 365–370 (2009)

    Google Scholar 

  2. Quinlan, J.R.: Induction of decision trees. Machine Learning 1(1), 81–106 (1986)

    Google Scholar 

  3. Hagan, M.T., Demuth, H.B., Beale, M.H.: Neural network design. Pws Pub., Boston (1996)

    Google Scholar 

  4. Burges, J.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery 2, 121–167 (1998)

    Article  Google Scholar 

  5. Rong, H.-J., Huang, G.-B., Ong, Y.-S.: Extreme learning machine for multi-categories classification applications. In: Proceedings of IEEE International Joint Conference on Neural Networks (IJCNN 2008) (IEEE World Congress on Computational Intelligence), Hong Kong, June 1-8, pp. 1709–1713 (2008)

    Google Scholar 

  6. Lan, Y., Soh, Y.C., Huang, G.-B.: Extreme learning machine-based bacterial protein subcellular localization prediction. In: Proceedings of IEEE International Joint Conference on Neural Networks (IJCNN 2008) (IEEE World Congress on Computational Intelligence), Hong Kong, June 1-8, pp. 1859–(1863)

    Google Scholar 

  7. Huang, G.-B., Chen, Y.-Q., Babri: Classification ability of single hidden layer feed-forward neural networks. Neural Networks 11(3), 799–801 (2000)

    Article  Google Scholar 

  8. Cheng, G.-J., Cai, L., Pan, H.-X.: Comparison of Extreme Learning Machine with Support Vector Regression for Reservoir Permeability Prediction. In: International Conference on Computational Intelligence and Security, vol. 2, pp. 173–176 (2009)

    Google Scholar 

  9. Jalil, K.A.: Comparison of Machine Learning Algorithms Performance in Detecting Network Intrusion. In: 2010 International Conference on Networking and Information Technology (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhifan Ye .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ye, Z., Yu, Y. (2015). Network Intrusion Detection. In: Cao, J., Mao, K., Cambria, E., Man, Z., Toh, KA. (eds) Proceedings of ELM-2014 Volume 2. Proceedings in Adaptation, Learning and Optimization, vol 4. Springer, Cham. https://doi.org/10.1007/978-3-319-14066-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14066-7_8

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14065-0

  • Online ISBN: 978-3-319-14066-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics