Affiliation:
1. Department of Electrical and Computer Engineering, University of Dayton, Dayton, OH, USA
Abstract
Security threats for computer networks have increased dramatically over the last decade, becoming bolder and more brazen. There is a strong need for effective Intrusion Detection Systems (IDS) that are designed to interpret intrusion attempts in incoming network traffic intelligently. In this paper, the authors explored the capabilities of Deep Belief Networks (DBN) – one of the most influential deep learning approach – in performing intrusion detection after training with the NSL-KDD dataset. Additionally, they examined the impact of using Extreme Learning Machine (ELM) and Regularized ELM on the same dataset to evaluate the performance against DBN and Support Vector Machine (SVM) approaches. The trained system identifies any type of unknown attack in the dataset examined. In addition to detecting attacks, the proposed system also classifies them into five groups. The implementation with DBN and SVM give a testing accuracy of about 97.5% and 88.33% respectively with 40% of training data selected from the NSL-KDD dataset. On the other hand, the experimental results show around 98.20% and 98.26% testing accuracy respectively for ELM and RELM after reducing the data dimensions from 41 to 9 essential features with 40% training data. ELM and RELM perform better in terms of testing accuracy upon comparison with DBN and SVM.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Ensemble Two Stage Machine Learning for Network Abnormal Detection;Proceedings of the 2023 15th International Conference on Machine Learning and Computing;2023-02-17
2. Intrusion Detection System Based on Machine Learning Techniques: A Survey;2022 2nd International Conference on Advances in Engineering Science and Technology (AEST);2022-10-24
3. Full-Rotation Quantum Convolutional Neural Network for Abnormal Intrusion Detection System;Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition;2022-09-23
4. An Intrusion Detection System based on PSO-GWO Hybrid Optimized Support Vector Machine;2021 International Joint Conference on Neural Networks (IJCNN);2021-07-18
5. Design and Validation of BlockEval, A Blockchain Simulator;2021 International Conference on COMmunication Systems & NETworkS (COMSNETS);2021-01-05