Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space

Buse Gul Atli, Yoan Miche*, Aapo Kalliola, Ian Oliver, Silke Holtmanns, Amaury Lendasse

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

26 Citations (Scopus)

Abstract

Recently, with the increased use of network communication, the risk of compromising the information has grown immensely. Intrusions have become more sophisticated and few methods can achieve efficient results while the network behavior constantly changes. This paper proposes an intrusion detection system based on modeling distributions of network statistics and Extreme Learning Machine (ELM) to achieve high detection rates of intrusions. The proposed model aggregates the network traffic at the IP subnetwork level and the distribution of statistics are collected for the most frequent IPv4 addresses encountered as destination. The obtained probability distributions are learned by ELM. This model is evaluated on the ISCX-IDS 2012 dataset, which is collected using a real-time testbed. The model is compared against leading approaches using the same dataset. Experimental results show that the presented method achieves an average detection rate of 91% and a misclassification rate of 9%. The experimental results show that our methods significantly improve the performance of the simple ELM despite a trade-off between performance and time complexity. Furthermore, our methods achieve good performance in comparison with the other few state-of-the-art approaches evaluated on the ISCX-IDS 2012 dataset.

Original languageEnglish
Pages (from-to)848–863
Number of pages16
JournalCognitive Computation
Volume10
Issue number5
Early online date5 Jun 2018
DOIs
Publication statusPublished - Oct 2018
MoE publication typeA1 Journal article-refereed

Keywords

  • Extreme learning machine
  • Hierarchical clustering
  • Intrusion detection
  • Network behavior analysis
  • Probability density function

Fingerprint

Dive into the research topics of 'Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space'. Together they form a unique fingerprint.

Cite this