Open Access

Intrusion Detection Based on Self-adaptive Differential Evolutionary Extreme Learning Machine


Cite

[1] Ilgun, K., Kemmerer, R.A., Porras, P.A., 1995. State transition analysis: a rule-based intrusion detection approach. IEEE Trans. Software Eng. 21 (3), 181–199. Search in Google Scholar

[2] Ikram S T, Cherukuri A K. Improving Accuracy of Intrusion Detection Model Using PCA and optimized SVM[J]. CIT. Journal of Computing and Information Technology, 2016, 24(2): 133-148. Search in Google Scholar

[3] Huang GB, Zhu QY, Siew CK. Extreme learning machine: a new learning scheme of feedforward neural networks. In: Proceedings of international joint conference on neural networks (IJCNN2004), vol 2, no 25–29, pp 985–990. Search in Google Scholar

[4] Huang GB, Zhu QY, Siew CK. Extreme learning machine: theory and applications. Neurocomputing 70(1–3):489–501. Search in Google Scholar

[5] Espana-Boquera S, Zamora-Martínez F, Castro-Bleda M J, et al. Efficient BP algorithms for general feedforward neural networks[C]//International Work-Conference on the Interplay Between Natural and Artificial Computation. Springer Berlin Heidelberg, 2007: 327-336. Search in Google Scholar

[6] G. Thatte, U. Mitra, and J. Heidemann, “Parametric methods for anomaly detection in aggregate traffic,” IEEE/ACM Transactions on Networking, vol. 19, no. 2, pp. 512–525, April 2011. Search in Google Scholar

[7] M. Qin and K. Hwang, “Frequent episode rules for internet anomaly detection,” in Proceedings of the Network Computing and Applications, Third IEEE International Symposium. Washington, DC, USA: IEEE Computer Society, 2004, pp. 161–168. Search in Google Scholar

[8] X. He, C. Papadopoulos, J. Heidemann, U. Mitra, and U. Riaz, “Remote detection of bottleneck links using spectral and statistical methods,” Computer Networks, vol. 53, pp. 279–298, February 2009. Search in Google Scholar

[9] W. W. Streilein, R. K. Cunningham, and S. E. Webster, “Improved detec- tion of low-profile probe and denial-of-service attacks,” in Proceedings of the 2001 Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, June 2001. Search in Google Scholar

[10] C. Cortes and V. Vapnik, “Support-vector networks,” Machine Learning, vol. 20, pp. 273–297, 1995. Search in Google Scholar

[11] G.-B. Huang, D. H. Wang, and Y. Lan, “Extreme learning machines: a survey,” International Journal of Machine Leaning and Cybernetics, vol. 2, no. 2, pp. 107–122, 2011. Search in Google Scholar

[12] G. Tandon, “Weighting versus pruning in rule validation for detecting network and host anomalies,” in In Proceedings of the 13th ACM SIGKDD international. ACM Press, 2007. Search in Google Scholar

[13] Y. Liao and V. R. Vemuri, “Use of k-nearest neighbor classifier for intrusion detection,” Computers & Security, vol. 25, pp. 439–448, 2002. Search in Google Scholar

[14] Storn R, Price K (2004) Differential evolution—a simple and efficient heuristic for global optimization over continuous spaces. J Glob Optim 11(4):341–359 Search in Google Scholar

[15] Ilonen J, Kamarainen JI, Lampinen J (2003) Differential evolution training algorithm for feedforward neural networks. Neural Process Lett 17:93–105 Search in Google Scholar

[16] Subudhi B, Jena D (2008) Differential evolution and levenberg marquardt trained neural network scheme for nonlinear system identification. Neural Process Lett 27:285–296. Search in Google Scholar

[17] Zhu Q-Y, Qin A-K, Suganthan P-N, Huang G-B (2005) Evolutionary extreme learning machine. Pattern Recog 38(10):1759–1763 Search in Google Scholar

[18] (1999)KDDCUPdataset.http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Search in Google Scholar

[19] S. Mukkamala and A. Sung, “Detecting denial of service attacks using support vector machines,” in Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003. Search in Google Scholar

[20] M. Luo, L. Wang, H. Zhang, and J. Chen, “A research on intrusion detection based on unsupervised clustering and support vector machine,” in Information and Communications Security, ser. Lecture Notes in Computer Science, S. Qing, D. Gollmann, and J. Zhou, Eds. Springer Berlin / Heidelberg, 2003, vol. 2836, pp. 325–336. Search in Google Scholar

[21] D. Kim and J. Park, “Network-based intrusion detection with support vector machines,” in Information Networking, ser. Lecture Notes in Computer Science, H.-K. Kahng, Ed. Springer Berlin / Heidelberg, 2003, vol. 2662, pp. 747-756. Search in Google Scholar

[22] Lin, Y., Lv, F., Zhu S., Yang, M., Cour, T., Yu, K., Cao, L., Huang, T.S.: Large-scale image classification: fast feature extraction and SVM training. In: Proceedings of the 24th IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1689-1696 (2011). Search in Google Scholar

[23] Huang G-B, Chen L, Siew CK (2006) Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Trans Neural Netw17(4):879-892 Search in Google Scholar

[24] R. Storn, K. Price, Differential evolution-A simple and efficient heuristic for global optimization over continuous spaces, Journal of Global Optimization, 11 (1997) 341-359. Search in Google Scholar

[25] J. Brest, S. Greiner, B. Bošković, M. Mernik, V. Žumer, Self-adapting control parameters in differential evolution: A comprehensive study on numerical benchmark problems. IEEE Transactions on Evolutionary Computation, 10 (2006) 646-657. Search in Google Scholar

[26] J. Wu, Z. H. Cai, Attribute Weighting via Differential Evolution Algorithm for Attribute Weighted Naive Bayes (WNB), Journal of Computational Information Systems, 7 (2011) 1672-1679. Search in Google Scholar

[27] S. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, “Costbased modeling for fraud and intrusion detection: results from the JAM project,” in Proceedings of DARPA Information Survivability Conference and Exposition, vol. 2, January 2002, pp. 130-144.. Search in Google Scholar

eISSN:
2470-8038
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, other