A Comparative Study of ML-ELM and DNN for Intrusion Detection

Intrusion detection remains one of the critical research issues in network security. Many machine learning algorithms have been proposed to develop intrusion detection systems, which can categorize network traffic into normal and anomalous classes. The multilayer extreme learning machine (ML-ELM) and the deep neural network (DNN) are two machine learning algorithms based on different theories/concepts that use the same multilayer architecture. In this paper, a comparative study is performed to shed light on the selection between these two algorithms with the same architecture in intrusion detection applications. The study explores the performance of the ML-ELM and DNN algorithms under similar parameter settings. With in-depth analysis and discussions, the limitations and advantages of each algorithm are outlined. In addition, the performance trend of each algorithm with increasing parameter values is studied.

[1]  Raouf Boutaba,et al.  A comprehensive survey on machine learning for networking: evolution, applications and research opportunities , 2018, Journal of Internet Services and Applications.

[2]  Sang Hyun Kim,et al.  Method of intrusion detection using deep neural network , 2017, 2017 IEEE International Conference on Big Data and Smart Computing (BigComp).

[3]  Jiankun Hu,et al.  Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram , 2019, IEEE Transactions on Industrial Informatics.

[4]  Lei Yang,et al.  Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC , 2018, Wirel. Commun. Mob. Comput..

[5]  Kangfeng Zheng,et al.  Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network , 2019, Sensors.

[6]  Jian Wang,et al.  Surveillance video online prediction using multilayer ELM with object principal trajectory , 2019, Signal Image Video Process..

[7]  Michael N. Johnstone,et al.  Seven Pitfalls of Using Data Science in Cybersecurity , 2020, Data Science in Cybersecurity and Cyberthreat Intelligence.

[8]  Shifei Ding,et al.  Extreme learning machine and its applications , 2013, Neural Computing and Applications.

[9]  Wathiq Laftah Al-Yaseen,et al.  Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system , 2017, Expert Syst. Appl..

[10]  Yuan Lan,et al.  Two-stage extreme learning machine for regression , 2010, Neurocomputing.

[11]  L. C. Kasun,et al.  Representational Learning with Extreme Learning Machine for Big Data Liyanaarachchi , 2022 .

[12]  Manas Ranjan Patra,et al.  A Hybrid Intelligent Approach for Network Intrusion Detection , 2012 .

[13]  Sang-Hyun Choi,et al.  Feature Selection using Attribute Ratio in NSL-KDD data , 2014 .

[14]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.

[15]  Kun Xie,et al.  New Improved Training for Deep Neural Networks Based on Intrusion Detection System , 2018 .

[16]  Guang-Bin Huang,et al.  Extreme Learning Machine for Multilayer Perceptron , 2016, IEEE Transactions on Neural Networks and Learning Systems.

[17]  Magnus Westerlund,et al.  Using extreme learning machine for intrusion detection in a big data environment , 2014, AISec '14.

[18]  Mounir Ghogho,et al.  Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[19]  Christian Diedrich,et al.  Accelerated deep neural networks for enhanced Intrusion Detection System , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[20]  Chen Zhang,et al.  A Novel Intrusion Detection System based on Extreme Machine Learning and Multi-Voting Technology , 2019, 2019 Chinese Control Conference (CCC).

[21]  Guang-Bin Huang,et al.  Extreme learning machine: a new learning scheme of feedforward neural networks , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).

[22]  Chee Kheong Siew,et al.  Universal Approximation using Incremental Constructive Feedforward Networks with Random Hidden Nodes , 2006, IEEE Transactions on Neural Networks.

[23]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[24]  Jamal Ghasemi,et al.  Intrusion detection system using an optimized kernel extreme learning machine and efficient features , 2019, Sādhanā.

[25]  Milos Manic,et al.  Improving User Trust on Deep Neural Networks Based Intrusion Detection Systems , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.

[26]  Chi Cheng,et al.  Extreme learning machines for intrusion detection , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).

[27]  Je-Won Kang,et al.  A Novel Intrusion Detection Method Using Deep Neural Network for In-Vehicle Network Security , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).

[28]  Aboul Ella Hassanien,et al.  Comparison of classification techniques applied for network intrusion detection and classification , 2017, J. Appl. Log..

[29]  Kuan-Ching Li,et al.  Wireless sensor network intrusion detection system based on MK-ELM , 2020, Soft Comput..

[30]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[31]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..