Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System

The detection of network attacks on computer systems remains an attractive but challenging research scope. As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. The incorporation of a single parallel hidden layer feed-forward neural network to the Fast Learning Network (FLN) architecture gave rise to the improved Extreme Learning Machine (ELM). The input weights and hidden layer biases are randomly generated. In this paper, the particle swan optimization algorithm (PSO) was used to obtain an optimal set of initial parameters for Reduce Kernel FLN (RK-FLN), thus, creating an optimal RKFLN classifier named PSO-RKELM. The derived model was rigorously compared to four models, including basic ELM, basic FLN, Reduce Kernel ELM (RK-ELM), and RK-FLN. The approach was tested on the KDD Cup99 intrusion detection dataset and the results proved the proposed PSO-RKFLN as an accurate, reliable, and effective classification algorithm.

[1]  Wan-Yu Deng,et al.  Cross-person activity recognition using reduced kernel extreme learning machine , 2014, Neural Networks.

[2]  Saadiah Yahya,et al.  A hybrid intrusion detection system based on different machine learning algorithms , 2013 .

[3]  Guoqiang Li,et al.  Fast learning network: a novel artificial neural network with a fast learning speed , 2013, Neural Computing and Applications.

[4]  Hamid Mohamadi,et al.  Design and analysis of genetic fuzzy systems for intrusion detection in computer networks , 2011, Expert Syst. Appl..

[5]  Guoqiang Li,et al.  Combustion optimization of a coal-fired boiler with double linear fast learning network , 2016, Soft Comput..

[6]  Huijuan Lu,et al.  A kernel extreme learning machine algorithm based on improved particle swam optimization , 2017, Memetic Comput..

[7]  Anirban Sengupta,et al.  MO-PSE: Adaptive multi-objective particle swarm optimization based design space exploration in architectural synthesis for application specific processor design , 2014, Adv. Eng. Softw..

[8]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[9]  Hongming Zhou,et al.  Extreme Learning Machine for Regression and Multiclass Classification , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[10]  Stephen Cameron,et al.  Multi-modal People Detection from Aerial Video , 2013, CORES.

[11]  Xia Li,et al.  An Adaptive Extreme Learning Machine for Modeling NOx Emission of a 300 MW Circulating Fluidized Bed Boiler , 2017, Neural Processing Letters.

[12]  Jeffrey Fan,et al.  Ensemble of machine learning algorithms for intrusion detection , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[13]  Gang Wang,et al.  An efficient hybrid kernel extreme learning machine approach for early diagnosis of Parkinson's disease , 2016, Neurocomputing.

[14]  Yang Wang,et al.  An adaptive kernel-based weighted extreme learning machine approach for effective detection of Parkinson's disease , 2017, Biomed. Signal Process. Control..

[15]  Chi-Man Vong,et al.  Fast detection of impact location using kernel extreme learning machine , 2014, Neural Computing and Applications.

[16]  David J. Weller-Fahy,et al.  Network Intrusion Dataset Assessment , 2013 .

[17]  Guang-Bin Huang,et al.  Extreme learning machine: a new learning scheme of feedforward neural networks , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).

[18]  Hui Huang,et al.  Toward an optimal kernel extreme learning machine using a chaotic moth-flame optimization strategy with applications in medical diagnoses , 2017, Neurocomputing.

[19]  Anirban Sengupta,et al.  User power-delay budget driven PSO based design space exploration of optimal k-cycle transient fault secured datapath during high level synthesis , 2015, Sixteenth International Symposium on Quality Electronic Design.

[20]  Keith Phalp,et al.  Exploring discrepancies in findings obtained with the KDD Cup '99 data set , 2011, Intell. Data Anal..

[21]  Bernhard Schölkopf,et al.  Learning with kernels , 2001 .

[22]  Shifei Ding,et al.  Extreme learning machine and its applications , 2013, Neural Computing and Applications.

[23]  Mahdi Zamani,et al.  Machine Learning Techniques for Intrusion Detection , 2013, ArXiv.

[24]  Timothy A. Warner,et al.  Kernel-based extreme learning machine for remote-sensing image classification , 2013 .

[25]  Vipul Kumar Mishra,et al.  Swarm-inspired exploration of architecture and unrolling factors for nested-loop-based application in architectural synthesis , 2015 .

[26]  Vijay Varadharajan,et al.  Intrusion detection techniques in cloud environment: A survey , 2017, J. Netw. Comput. Appl..

[27]  V. Jaiganesh,et al.  Kernelized Extreme Learning Machine with Levenberg-Marquardt Learning Approach towards Intrusion Detection , 2012 .

[28]  Harish Kumar,et al.  An intrusion detection system using network traffic profiling and online sequential extreme learning machine , 2015, Expert Syst. Appl..

[29]  Liwei Tang,et al.  2-D defect profile reconstruction from ultrasonic guided wave signals based on QGA-kernelized ELM , 2014, Neurocomputing.

[30]  Chen Chen,et al.  Spectral-Spatial Classification of Hyperspectral Image Based on Kernel Extreme Learning Machine , 2014, Remote. Sens..

[31]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[32]  Xu Zhang,et al.  Efficient classification using parallel and scalable compressed model and its application on intrusion detection , 2014, Expert Syst. Appl..

[33]  Ioan Cristian Trelea,et al.  The particle swarm optimization algorithm: convergence analysis and parameter selection , 2003, Inf. Process. Lett..

[34]  Teresa F. Lunt,et al.  A survey of intrusion detection techniques , 1993, Comput. Secur..

[35]  Xianbin Wang,et al.  Machine learning techniques for intrusion detection on public dataset , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[36]  Jun Gao,et al.  Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection , 2014, IEEE Transactions on Cybernetics.

[37]  Anirban Sengupta,et al.  TL-HLS: Methodology for Low Cost Hardware Trojan Security Aware Scheduling With Optimal Loop Unrolling Factor During High Level Synthesis , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[38]  Verónica Bolón-Canedo,et al.  Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset , 2011, Expert Syst. Appl..

[39]  Shahram Sarkani,et al.  MARK-ELM: Application of a novel Multiple Kernel Learning framework for improving the robustness of Network Intrusion Detection , 2015, Expert Syst. Appl..

[40]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[41]  Yue Shi,et al.  A modified particle swarm optimizer , 1998, 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98TH8360).

[42]  Wei Li,et al.  Hyperspectral image classification by AdaBoost weighted composite kernel extreme learning machines , 2018, Neurocomputing.

[43]  Mohammad Javad Golkar,et al.  A hybrid method consisting of GA and SVM for intrusion detection system , 2016, Neural Computing and Applications.

[44]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[45]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.