Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2666652.2666664acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Using extreme learning machine for intrusion detection in a big data environment

Published: 07 November 2014 Publication History

Abstract

Extending state-of-the-art machine learning algorithms to highly scalable (big data) analysis environments is crucial for the handling of authentic datasets in Intrusion Detection Systems (IDS). Traditional supervised learning methods are considered to be too slow for use in these environments. Therefore, we propose the use of Extreme Learning Machine (ELM) for detecting network intrusion attempts. We show they hold great promise for the field by employing a MapReduce based variant evaluated on the open source tool Hadoop.

References

[1]
"KDDcup dataset," 1999. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
[2]
S. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Applied Soft Computing, vol. 10, no. 1, pp. 1--35, 2010.
[3]
Z. Q.-Y. Huang, G.-B. and C.-K. Siew, "Universal approximation using incremental constructive feedforward networks with random hidden nodes," IEEE Transactions on Neural Networks, vol. 17, no. 4, pp. 879--892, 2006.
[4]
C. Cheng, W. P. Tay, and G.-B. Huang, "Extreme learning machines for intrusion detection," in Proceedings of the International Joint Conference on Neural Networks (IJCNN'12), pp. 1--8, IEEE, June 10-12, 2012.
[5]
"CSA Cloud Security Alliance." Available: mhttps://cloudsecurityalliance.org/.
[6]
Big Data Working Group, "Big data analytics for security intelligence," 2013. CSA Cloud Security Alliance, Retrieved January 3, 2014, from https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Big_Data_Analytics_for_Security_Intelligence.pdf.
[7]
T. Dumitras and D. Shou, "Toward a standard benchmark for computer security research: The worldwide intelligence network environment (wine)," in Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 89--96, ACM, 2011.
[8]
J. Dean and S. Ghemawat, "Mapreduce: Simplified data processing on large clusters," Communications of the ACM, vol. 51, pp. 107--113, Jan. 2008.
[9]
The Apache Software Foundation, "Welcome to Apache Hadoop!," 2013.
[10]
D. Borthakur, "The hadoop distributed file system: architecture and design," 2007. Retrieved July 17, 2014, from http://hadoop.apache.org/common/docs/r0.18.0/hdfs_design.pdf.
[11]
T. Chen, X. Zhang, S. Jin, and O. Kim, "Efficient classification using parallel and scalable compressed model and its application on intrusion detection," Expert Systems with Applications, vol. 41, no. 13, pp. 5972--5983, 2014.
[12]
M. Bhuyan, D. Bhattacharyya, and J. Kalita, "Network anomaly detection: Methods, systems and tools," Communications Surveys & Tutorials, IEEE, vol. 16, no. 1, pp. 303--336, 2014.
[13]
S. Mukkamala, G. Janoski, and A. Sung, "Intrusion detection using neural networks and support vector machines," in Proceedings of the International Joint Conference on Neural Networks (IJCNN'02), pp. 1702--1707, May 12-17 2002.
[14]
G. Creech and J. Hu, "A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns," IEEE Transaction on Computers, vol. 63, no. 4, pp. 807--819, 2014.
[15]
Q. He, T. Shang, F. Zhuang, and Z. Shi, "Parallel extreme learning machine for regression based on mapreduce," Neurocomputing, vol. 102, pp. 52--58, Feb. 2013.
[16]
S. Haykin, Neural Networks and Learning Machines. Pearson Prentice Hall, USA, 3rd ed., 2009.
[17]
G.-B. Huang, H. Zhou, X. Ding, and R. Zhang, "Extreme learning machine for regression and multiclass classification," IEEE Transactions on Systems, Man, and Cybernetics, Part B, vol. 42, no. 2, pp. 513--529, 2012.
[18]
G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, "Extreme learning machine: Theory and applications," Neurocomputing, vol. 70, no. 1--3, pp. 489--501, 2006.
[19]
J. Xin, Z. Wang, C. Chen, L. Ding, G. Wang, and Y. Zhao, "Elm: distributed extreme learning machine with mapreduce,"World Wide Web, pp. 1--16, 2013.
[20]
Y. Miche, A. Sorjamaa, P. Bas, O. Simula, C. Jutten, and A. Lendasse, "OP-ELM: Optimally-pruned extreme learning machine," IEEE Transactions on Neural Networks, vol. 21, pp. 158--162, January 2010.
[21]
R. Rouhi, F. Keynia, and M. Amiri, "Improving the intrusion detection systems' performance by correlation as a sample selection method," Journal of Computer Sciences and Applications, vol. 1, no. 3, pp. 33--38, 2013.

Cited By

View all
  • (2024)A Review on Large-Scale Data Processing with Parallel and Distributed Randomized Extreme Learning Machine Neural NetworksMathematical and Computational Applications10.3390/mca2903004029:3(40)Online publication date: 27-May-2024
  • (2022)Hybrid Whale Tabu algorithm optimized convolutional neural network architecture for intrusion detection in big dataConcurrency and Computation: Practice and Experience10.1002/cpe.703834:19Online publication date: 18-May-2022
  • (2021)A Comparative Study of ML-ELM and DNN for Intrusion DetectionProceedings of the 2021 Australasian Computer Science Week Multiconference10.1145/3437378.3437390(1-7)Online publication date: 1-Feb-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AISec '14: Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop
November 2014
134 pages
ISBN:9781450331531
DOI:10.1145/2666652
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. big data
  2. classification
  3. extreme learning machine
  4. intrusion detection
  5. mapreduce

Qualifiers

  • Research-article

Conference

CCS'14
Sponsor:

Acceptance Rates

AISec '14 Paper Acceptance Rate 12 of 24 submissions, 50%;
Overall Acceptance Rate 94 of 231 submissions, 41%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)33
  • Downloads (Last 6 weeks)5
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Review on Large-Scale Data Processing with Parallel and Distributed Randomized Extreme Learning Machine Neural NetworksMathematical and Computational Applications10.3390/mca2903004029:3(40)Online publication date: 27-May-2024
  • (2022)Hybrid Whale Tabu algorithm optimized convolutional neural network architecture for intrusion detection in big dataConcurrency and Computation: Practice and Experience10.1002/cpe.703834:19Online publication date: 18-May-2022
  • (2021)A Comparative Study of ML-ELM and DNN for Intrusion DetectionProceedings of the 2021 Australasian Computer Science Week Multiconference10.1145/3437378.3437390(1-7)Online publication date: 1-Feb-2021
  • (2021)A Comprehensive Survey on Big Data Technology Based Cybersecurity Analytics SystemsApplied Soft Computing and Communication Networks10.1007/978-981-33-6173-7_9(123-143)Online publication date: 2-Jul-2021
  • (2020)An intrusion detection method based on active transfer learningIntelligent Data Analysis10.3233/IDA-19448724:2(363-383)Online publication date: 27-Mar-2020
  • (2020)A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection SystemsIEEE Access10.1109/ACCESS.2020.30001798(104650-104675)Online publication date: 2020
  • (2020)A Comparative Evaluation of Unsupervised Deep Architectures for Intrusion Detection in Sequential Data StreamsExpert Systems with Applications10.1016/j.eswa.2020.113577(113577)Online publication date: May-2020
  • (2019)ON THE USE OF EXTREME LEARNING MACHINES FOR DETECTING ANOMALIES IN STUDENTS' RESULTSi-manager's Journal on Computer Science10.26634/jcom.6.4.157246:4(34)Online publication date: 2019
  • (2019)Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregationEURASIP Journal on Information Security10.1186/s13635-019-0098-y2019:1Online publication date: 22-Oct-2019
  • (2019)An Architecture-Driven Adaptation Approach for Big Data Cyber Security Analytics2019 IEEE International Conference on Software Architecture (ICSA)10.1109/ICSA.2019.00013(41-50)Online publication date: Mar-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media