Skip to main content
Erschienen in: Cognitive Computation 5/2018

05.06.2018

Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space

verfasst von: Buse Gul Atli, Yoan Miche, Aapo Kalliola, Ian Oliver, Silke Holtmanns, Amaury Lendasse

Erschienen in: Cognitive Computation | Ausgabe 5/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, with the increased use of network communication, the risk of compromising the information has grown immensely. Intrusions have become more sophisticated and few methods can achieve efficient results while the network behavior constantly changes. This paper proposes an intrusion detection system based on modeling distributions of network statistics and Extreme Learning Machine (ELM) to achieve high detection rates of intrusions. The proposed model aggregates the network traffic at the IP subnetwork level and the distribution of statistics are collected for the most frequent IPv4 addresses encountered as destination. The obtained probability distributions are learned by ELM. This model is evaluated on the ISCX-IDS 2012 dataset, which is collected using a real-time testbed. The model is compared against leading approaches using the same dataset. Experimental results show that the presented method achieves an average detection rate of 91% and a misclassification rate of 9%. The experimental results show that our methods significantly improve the performance of the simple ELM despite a trade-off between performance and time complexity. Furthermore, our methods achieve good performance in comparison with the other few state-of-the-art approaches evaluated on the ISCX-IDS 2012 dataset.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akusok A, Miche Y, Hegedus J, Nian R, Lendasse A. A two-Stage methodology using k-NN and false-positive minimizing ELM for nominal data classification. Cogn Comput 2014;6(3):432–445.CrossRef Akusok A, Miche Y, Hegedus J, Nian R, Lendasse A. A two-Stage methodology using k-NN and false-positive minimizing ELM for nominal data classification. Cogn Comput 2014;6(3):432–445.CrossRef
2.
Zurück zum Zitat Ammar A. Decision tree classifier for intrusion detection priority tagging. J Comput Commun 2015;3(4):52.CrossRef Ammar A. Decision tree classifier for intrusion detection priority tagging. J Comput Commun 2015;3(4):52.CrossRef
3.
4.
Zurück zum Zitat Bace R, Mell P. 2001. NIST special publication on intrusion detection systems. US Department of Defense. Bace R, Mell P. 2001. NIST special publication on intrusion detection systems. US Department of Defense.
5.
Zurück zum Zitat Baeza-Yates R, Ribeiro-Neto B, Vol. 463. Modern information retrieval. New York: ACM press; 1999. Baeza-Yates R, Ribeiro-Neto B, Vol. 463. Modern information retrieval. New York: ACM press; 1999.
6.
Zurück zum Zitat Barayas O. How the Internet of Things Is Changing the Cybersecurity Landscape. Barayas O. How the Internet of Things Is Changing the Cybersecurity Landscape.
7.
Zurück zum Zitat Bhuyan MH, Bhattacharyya DK, Kalita JK. Network anomaly detection: methods systems and tools. IEEE commun Surveys Tutor 2014;16:303–336.CrossRef Bhuyan MH, Bhattacharyya DK, Kalita JK. Network anomaly detection: methods systems and tools. IEEE commun Surveys Tutor 2014;16:303–336.CrossRef
8.
Zurück zum Zitat Bishop CM. 2006. Pattern recognition and machine learning. Bishop CM. 2006. Pattern recognition and machine learning.
9.
Zurück zum Zitat Cormode G, Korn F, Muthukrishnan S, Srivastava D. Finding hierarchical heavy hitters in data streams. Proceedings of the 29th international conference on Very large data bases; 2003. p. 464–475.CrossRef Cormode G, Korn F, Muthukrishnan S, Srivastava D. Finding hierarchical heavy hitters in data streams. Proceedings of the 29th international conference on Very large data bases; 2003. p. 464–475.CrossRef
10.
Zurück zum Zitat Deng C, Wang S, Li Z, Huang GB, Lin W. Content-Insensitive blind image blurriness assessment using weibull statistics and sparse extreme learning machine. IEEE Trans Syst Man Cybern: Syst 2017;PP(99):1–12. Deng C, Wang S, Li Z, Huang GB, Lin W. Content-Insensitive blind image blurriness assessment using weibull statistics and sparse extreme learning machine. IEEE Trans Syst Man Cybern: Syst 2017;PP(99):1–12.
11.
Zurück zum Zitat Ding S, Zhang J, Jia H, Qian J. An adaptive density data stream clustering algorithm. Cogn Comput 2016;8(1):30–38.CrossRef Ding S, Zhang J, Jia H, Qian J. An adaptive density data stream clustering algorithm. Cogn Comput 2016;8(1):30–38.CrossRef
12.
Zurück zum Zitat Folino G, Pisani FS, Sabatino P. A distributed intrusion detection framework based on evolved specialized ensembles of classifiers. European conference on the applications of evolutionary computation. International Publishing; 2016. p. 315–331. Folino G, Pisani FS, Sabatino P. A distributed intrusion detection framework based on evolved specialized ensembles of classifiers. European conference on the applications of evolutionary computation. International Publishing; 2016. p. 315–331.
13.
Zurück zum Zitat Gaddam SR, Phoha VV, Balagani KS. K-means+ id3: a novel method for supervised anomaly detection by cascading k-means clustering and id3 decision tree learning methods. IEEE Trans Knowl Data Eng 2007;19(3): 345–354.CrossRef Gaddam SR, Phoha VV, Balagani KS. K-means+ id3: a novel method for supervised anomaly detection by cascading k-means clustering and id3 decision tree learning methods. IEEE Trans Knowl Data Eng 2007;19(3): 345–354.CrossRef
14.
Zurück zum Zitat Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernández G, Vázquez E. Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 2009;28:18–28.CrossRef Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernández G, Vázquez E. Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 2009;28:18–28.CrossRef
15.
Zurück zum Zitat Gu G, Fogla P, Dagon D, Lee W, Skorić B. Measuring intrusion detection capability: an information-theoretic approach. Proceedings of the 2006 ACM Symposium on Information computer and communications security; 2006. p. 90–101. Gu G, Fogla P, Dagon D, Lee W, Skorić B. Measuring intrusion detection capability: an information-theoretic approach. Proceedings of the 2006 ACM Symposium on Information computer and communications security; 2006. p. 90–101.
16.
Zurück zum Zitat Huang GB, Chen L, Siew CK. Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Trans Neural Netw 2006;17:879–892.CrossRefPubMed Huang GB, Chen L, Siew CK. Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Trans Neural Netw 2006;17:879–892.CrossRefPubMed
17.
Zurück zum Zitat Huang G-B, Liang N-Y, Rong H-J, Saratchran P, Sundararajan N. On-line sequential extreme learning machine. Calgary: ACTA Press; 2005. Huang G-B, Liang N-Y, Rong H-J, Saratchran P, Sundararajan N. On-line sequential extreme learning machine. Calgary: ACTA Press; 2005.
18.
Zurück zum Zitat Huang GB, Zhu QY, Siew CK. Extreme learning machine: theory and applications. Neurocomputing 2006; 70:489–501.CrossRef Huang GB, Zhu QY, Siew CK. Extreme learning machine: theory and applications. Neurocomputing 2006; 70:489–501.CrossRef
19.
Zurück zum Zitat Huang G-B. An insight into extreme learning machines: random neurons, random features and kernels. Cogn Comput 2014;6(3):376–390.CrossRef Huang G-B. An insight into extreme learning machines: random neurons, random features and kernels. Cogn Comput 2014;6(3):376–390.CrossRef
20.
Zurück zum Zitat Huang G-B. What are extreme learning machines? filling the gap between frank Rosenblatt’s dream and John von Neumann’s puzzle. Cogn Comput 2015;7(3):263–278.CrossRef Huang G-B. What are extreme learning machines? filling the gap between frank Rosenblatt’s dream and John von Neumann’s puzzle. Cogn Comput 2015;7(3):263–278.CrossRef
21.
Zurück zum Zitat Khan L, Awad M, Thuraisingham B. A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J—The Int J Very Large Data Bases 2007;16(4):507–521.CrossRef Khan L, Awad M, Thuraisingham B. A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J—The Int J Very Large Data Bases 2007;16(4):507–521.CrossRef
22.
Zurück zum Zitat Kumar G, Kumar K. 2013. Design of an evolutionary approach for intrusion detection. The Scientific World Journal. Kumar G, Kumar K. 2013. Design of an evolutionary approach for intrusion detection. The Scientific World Journal.
23.
Zurück zum Zitat Liao Y, Vemuri VR. Use of k-nearest neighbor classifier for intrusion detection. Comput Secur 2002;21(5): 439–448.CrossRef Liao Y, Vemuri VR. Use of k-nearest neighbor classifier for intrusion detection. Comput Secur 2002;21(5): 439–448.CrossRef
24.
Zurück zum Zitat Lim SY, Jones A. 2008. Network anomaly detection system: the state of art of network behaviour analysis pages 459–465. Lim SY, Jones A. 2008. Network anomaly detection system: the state of art of network behaviour analysis pages 459–465.
25.
Zurück zum Zitat Liu X, Wang L, Yin J, Zhu E, Zhang J. An efficient approach to integrating radius information into multiple kernel learning. IEEE Tran Cybern 2013;43(2):557–569.CrossRef Liu X, Wang L, Yin J, Zhu E, Zhang J. An efficient approach to integrating radius information into multiple kernel learning. IEEE Tran Cybern 2013;43(2):557–569.CrossRef
26.
Zurück zum Zitat Liu X, Wang L, Huang G-B, Zhang J, Yin J. Multiple kernel extreme learning machine. Neurocomputing 2015;149:253–264.CrossRef Liu X, Wang L, Huang G-B, Zhang J, Yin J. Multiple kernel extreme learning machine. Neurocomputing 2015;149:253–264.CrossRef
27.
Zurück zum Zitat Lucas M. Network flow analysis. San Francisco: No Starch Press; 2010. Lucas M. Network flow analysis. San Francisco: No Starch Press; 2010.
28.
Zurück zum Zitat Mao W, Jiang M, Wang J, Li Y. Online extreme learning machine with hybrid sampling strategy for sequential imbalanced data. Cogn Comput 2017;9(6):780–800.CrossRef Mao W, Jiang M, Wang J, Li Y. Online extreme learning machine with hybrid sampling strategy for sequential imbalanced data. Cogn Comput 2017;9(6):780–800.CrossRef
29.
Zurück zum Zitat Miche Y, Sorjamaa A, Bas P, Simula O, Jutten C, Lendasse A. Op-elm: optimally pruned extreme learning machine. IEEE Trans Neural Netw 2010;21:158–162.CrossRefPubMed Miche Y, Sorjamaa A, Bas P, Simula O, Jutten C, Lendasse A. Op-elm: optimally pruned extreme learning machine. IEEE Trans Neural Netw 2010;21:158–162.CrossRefPubMed
30.
Zurück zum Zitat Patcha A, Jung-Min P. An overview of anomaly detection techniques Existing solutions and latest technological trends. Comput Netw 2007;51:3448–3470.CrossRef Patcha A, Jung-Min P. An overview of anomaly detection techniques Existing solutions and latest technological trends. Comput Netw 2007;51:3448–3470.CrossRef
31.
Zurück zum Zitat Perkins CE. 2010. IP mobility support for IPv4. Perkins CE. 2010. IP mobility support for IPv4.
32.
Zurück zum Zitat Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 2012;31:357–374.CrossRef Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 2012;31:357–374.CrossRef
33.
Zurück zum Zitat Srinivasan V, Varghese G. Faster ip lookups using controlled prefix expansion. ACM SIGMETRICS Performance Evaluation Rev 1998;26:1–10.CrossRef Srinivasan V, Varghese G. Faster ip lookups using controlled prefix expansion. ACM SIGMETRICS Performance Evaluation Rev 1998;26:1–10.CrossRef
34.
Zurück zum Zitat Tan Z, Jamdagni A, He X, Nanda P, Liu RP, Hu J. Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans Comput 2015;64(9):2519–2533.CrossRef Tan Z, Jamdagni A, He X, Nanda P, Liu RP, Hu J. Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans Comput 2015;64(9):2519–2533.CrossRef
35.
Zurück zum Zitat Vasan KK, Surendiran B. Dimensionality reduction using principal component analysis for network intrusion detection. Perspectives Sci 2016;8:510–512.CrossRef Vasan KK, Surendiran B. Dimensionality reduction using principal component analysis for network intrusion detection. Perspectives Sci 2016;8:510–512.CrossRef
36.
Zurück zum Zitat Wang G, Hao J, Ma J, Huang L. A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 2010;37(9):6225–6232.CrossRef Wang G, Hao J, Ma J, Huang L. A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 2010;37(9):6225–6232.CrossRef
37.
Zurück zum Zitat Wang S, Deng C, Lin W, Huang GB, Zhao B. NMF-based image quality assessment using extreme learning machine. IEEE Trans Cybern 2017;47(1):232–243.CrossRefPubMed Wang S, Deng C, Lin W, Huang GB, Zhao B. NMF-based image quality assessment using extreme learning machine. IEEE Trans Cybern 2017;47(1):232–243.CrossRefPubMed
38.
Zurück zum Zitat Xu K, Zhang ZL, Bhattacharyya S. Internet traffic behavior profiling for network security monitoring. IEEE/ACM Trans Netw 2008;16:1241–1252.CrossRef Xu K, Zhang ZL, Bhattacharyya S. Internet traffic behavior profiling for network security monitoring. IEEE/ACM Trans Netw 2008;16:1241–1252.CrossRef
39.
Zurück zum Zitat Yassin W, Udzir NI, Muda Z, Sulaiman MN. Anomaly-based intrusion detection through k-means clustering and naives bayes classification. Proceedings of the 4th International Conference on Computing and Informatics; 2013. p. 298–303. Yassin W, Udzir NI, Muda Z, Sulaiman MN. Anomaly-based intrusion detection through k-means clustering and naives bayes classification. Proceedings of the 4th International Conference on Computing and Informatics; 2013. p. 298–303.
Metadaten
Titel
Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space
verfasst von
Buse Gul Atli
Yoan Miche
Aapo Kalliola
Ian Oliver
Silke Holtmanns
Amaury Lendasse
Publikationsdatum
05.06.2018
Verlag
Springer US
Erschienen in
Cognitive Computation / Ausgabe 5/2018
Print ISSN: 1866-9956
Elektronische ISSN: 1866-9964
DOI
https://doi.org/10.1007/s12559-018-9564-y

Weitere Artikel der Ausgabe 5/2018

Cognitive Computation 5/2018 Zur Ausgabe