The 2012 International Joint Conference on Neural Networks (IJCNN) 2012
DOI: 10.1109/ijcnn.2012.6252449
|View full text |Cite
|
Sign up to set email alerts
|

Extreme learning machines for intrusion detection

Abstract: We consider the problem of intrusion detection in a computer network, and investigate the use of extreme learning machines (ELMs) to classify and detect the intrusions. With increasing connectivity between networks, the risk of information systems to external attacks or intrusions has increased tremendously. Machine learning methods like support vector machines (SVMs) and neural networks have been widely used for intrusion detection. These methods generally suffer from long training times, require parameter tu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
40
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 68 publications
(40 citation statements)
references
References 15 publications
0
40
0
Order By: Relevance
“…ELMs have been widely used in many fields since their proposal, including intrusion detection. An ELM was used for intrusion detection and showed greater accuracy in intrusion detection than that of an SVM [21]. Ye and Yu proposed an intrusion detection method in which each class was combined into an ensemble classifier using a one-to-all strategy [22].…”
Section: Related Workmentioning
confidence: 99%
“…ELMs have been widely used in many fields since their proposal, including intrusion detection. An ELM was used for intrusion detection and showed greater accuracy in intrusion detection than that of an SVM [21]. Ye and Yu proposed an intrusion detection method in which each class was combined into an ensemble classifier using a one-to-all strategy [22].…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, Cheng et al [30] proposed the use of ELM methods to classify binary and multi-class network traffic for intrusion detection with high accuracy. Hsu et al [31] proposed a real-time system for detecting botnets based on anomalous delays in HTTP/HTTPS requests from a given client with very promising results.…”
Section: Related Workmentioning
confidence: 99%
“…SVM can only be used for binary data. Cheng et al [28] said that, performance of SVM degrades when it is adapted for multi-class classification. Chitrakar and Chuanhe [29] have given an approach which combines k-Medoids clustering with SVM.…”
Section: Support Vector Machine (Svm) Based Intrusion Detectionmentioning
confidence: 99%