Fusion of BVM and ELM for Anomaly Detection in Computer Networks

This paper proposes a new network anomaly detection method in order to deal with the low detection rate and high false alarm rate problem. Ball vector machine (BVM) and extreme learning machine (ELM) is individually applied to learn three kinds of network features, then a BP neural network is utilized to simulate weights, which is used to fusion of the label. The experiments show that, the performance of this fusion method is better than single BVM or ELM classifier. Compared to the fusion method of SVM and BP neural network, the method proposed by this paper has a similar performance in detection rate and false alarm rate but with a significantly lower training time, and it is suitable for network anomaly detection with large scale dataset.

[1]  Chee Kheong Siew,et al.  Extreme learning machine: Theory and applications , 2006, Neurocomputing.

[2]  Gengming Zhu,et al.  Research of Intrusion Detection Based on Support Vector Machine , 2008, 2008 International Conference on Advanced Computer Theory and Engineering.

[3]  Fabio Roli,et al.  Intrusion detection in computer networks by a modular ensemble of one-class classifiers , 2008, Inf. Fusion.

[4]  Lei Cai,et al.  Comparison of Extreme Learning Machine with Support Vector Regression for Reservoir Permeability Prediction , 2009, 2009 International Conference on Computational Intelligence and Security.

[5]  Fabio Roli,et al.  Fusion of multiple classifiers for intrusion detection in computer networks , 2003, Pattern Recognit. Lett..

[6]  Salem Benferhat,et al.  On the combination of naive Bayes and decision trees for intrusion detection , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).

[7]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[8]  Guojian Cheng,et al.  Image Segmentation Based on Ball Vector Machine , 2012, 2012 International Conference on Computer Science and Service System.

[9]  Liu Yuan Fusion of SVM and BMPM for anomaly detection in computer networks , 2011 .

[10]  Andrew J. Clark,et al.  Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..