A Novel Transfer Extreme Learning Machine from Multiple Sources for Intrusion Detection

Author:

Wang Kunpeng1,Li Jingmei1,Wu Weifei2

Affiliation:

1. Harbin Engineering University

2. Beijing Institute of Remote Sensing Equipment

Abstract

Abstract Intrusion detection systems (IDSs), as a technology to protect networks from attacks, play a pivotal role in ensuring computer system and network security. Machine learning has been widely used for intrusion detection and achieves good results. Machine learning-based intrusion detection technology requires a large number of labeled data training models, test data and training data to create independent and identical distributions. However, in reality, data distributions are difficult to make consistent, and there are problems such as low detection accuracy, slow model establishment and the need for a large quantity of labor and time cost labeled samples when faced with small samples and new attack behaviors. In response to the above issues, this paper proposes, MultiTLELM, a multisource migration limit learning machine algorithm for network intrusion detection. The algorithm utilizes the multisource migration learning idea to quickly build a high-quality target learning model by migrating knowledge from multiple auxiliary domains (source domains), assisting in labeling target domains that are insufficient or difficult to obtain. MultiTLELM simultaneously adapts the differences in the marginal probability distribution and conditional probability distribution between domain data, improves the classification performance by integrating multisource migration learning into a limit learning machine and improves the detection efficiency by utilizing the fast solving speed of the limit learning machine optimization algorithm. Experiments were conducted on the NSL-KDD, KDD99 and ISCX2012 datasets. The experimental results show that the proposed method improves detection accuracy and efficiency compared to the benchmark algorithm, and also adapts to different intrusion types and attack modes.

Publisher

Research Square Platform LLC

Reference28 articles.

1. Buczak A, Guven E (2017) IEEE Commun Surv Tutorials 18(2):1153–1176A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection[J]

2. Tao Duan Y, Tian H, Zhang Y, Liu Q, Li J, Jiang (2020) Zongsheng Shi. IEEE Access 8:78330–78342Intelligent Processing of Intrusion Detection Data[J]

3. Mohamed Touahria. Feature Selection Algorithms in Intrusion Detection System: A Survey[J];Maza S;KSII Trans Internet Inf Syst,2018

4. Security for cyberspace: challenges and opportunities[J];Jiang-xing Wu Jian-hua;Front Inf Technol Electron Eng,2018

5. Mehmood T, Rais H (2016). SVM for network anomaly detection using ACO feature subset[C]// 2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC). IEEE,

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3