Abstract
Information is a powerful tool that can be used as a competitive advantage to increase market shares, competitiveness and keep products up-to-date. Protecting the information is a difficult task; intrusion detection systems is one of the tools of great importance for the protection of computer network infrastructures. IDSs (Intrusion Detection Systems) are tools that help users and network administrators to keep safe from intruders and attacks of various natures. Machine learning techniques are one of the most popular techniques for IDSs proposed and investigated in the literature. This paper focuses on the use of ELM (Extreme Learning Machine) and OS-ELM (Online Sequential ELM) techniques applied to IDSs. Some features of these methods that motivate their use for building IDSs are: (i) easy assignment of parameters; (ii) good generalization; and (iii) fast and online training. The results show that the methods can be easily applied to a huge amount of data without a significant generalization loss.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, J.P.: Computer security threat monitoring and surveillance. In: Fort Washington, Technical relatory (1980)
Huang, G.-B., Zhou, H., Ding, X., Zhang, R.: Extreme learning machine for regression and multiclass classification. IEEE Transactions on Systems, Man, and Cybernetics 42, 513–519 (2012)
Huang, G.-B., Zhu, Q.-Y., Siew, C.-K.: Extreme learning machine: a new learning scheme of feedforward neural networks. In: Proceeding of International Joint Conference on Neural Networks, vol. 2, pp. 985–990. IEEE (2004)
Kemmerer, R.A., Vigna, G.: Intrusion detection: a brief history and overview. Computer 35, 27–30 (2002)
Li, L., Lee, G.: Ddos attack detection and wavelets. In: Proceedings of The 12th International Conference on Computer Communications and Networks, ICCCN 2003, pp. 421–427. IEEE (2003)
Liang, N.Y., Huang, G.B., Saratchandran, P., Sundararajan, N.: A fast and accurate online sequential learning algorithm for feedforward networks. IEEE Transactions on Neural Networks 17, 1411–1423 (2006)
Mukkamala, S., Sung, A.H., Abraham, A.: Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications 28, 167, Science Direct (2005)
Shiri, F.I., Shanmugam, B., Idri, N.B.: A parallel technique for improving the performance of signature-based network intrusion detection system. In: International Conference on Communication Software and Networks, pp. 692–696. IEEE (2011)
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: IEEE 2009 Symposium on computational Intelligence in Security and Defense Applications (CISDA 2009), pp. 1–6. IEEE (2009)
Tian, J., Gao, M.: Network intrusion detection method based on high speed and precise genetic algorithm neural network. In: International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 2, pp. 619–622. IEEE (2009)
Tian, J., Gao, M., Zhang, F.: Network intrusion detection method based on radial basic function neural network. In: International Conference on E-Business and Information System Security (EBISS 2009), pp. 1–4. IEEE (2009)
Xiaoqing, G., Hebin, G., Luyi, C.: Network intrusion detection method based on agent and svm. In: The 2nd IEEE International Conference on Information Management and Engineering, pp. 399–402. IEEE (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
de Farias, G.P.M., de Oliveira, A.L.I., Cabral, G.G. (2012). Extreme Learning Machines for Intrusion Detection Systems. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds) Neural Information Processing. ICONIP 2012. Lecture Notes in Computer Science, vol 7666. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34478-7_65
Download citation
DOI: https://doi.org/10.1007/978-3-642-34478-7_65
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34477-0
Online ISBN: 978-3-642-34478-7
eBook Packages: Computer ScienceComputer Science (R0)