Network intrusion detection method based on double adaptive regularization online extreme learning machine

An extreme learning machine and intrusion detection technology, applied in the field of machine learning, can solve problems such as lowering efficiency, difficulty in satisfying real-time intrusion detection, and difficulty in detecting malicious intrusions

Inactive Publication Date: 2017-05-31
CENT SOUTH UNIV
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first point is that due to the continuous emergence of new network intrusion methods, the network data sample set is getting larger and larger (that is, the training data set is getting bigger and bigger), which increases the overhead of security analysis, reduces efficiency, and is difficult to meet the real-t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection method based on double adaptive regularization online extreme learning machine
  • Network intrusion detection method based on double adaptive regularization online extreme learning machine
  • Network intrusion detection method based on double adaptive regularization online extreme learning machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] This embodiment is divided into two parts: training and detection. Training is to train an extreme learning machine classifier using a labeled network data set, and detection is to use a trained classifier to detect network intrusion data in the data to be detected.

[0061] The effectiveness of the present invention is illustrated by simulating the training and detection process on the NSL-KDD data set. The NSL-KDD data set is an improved version of the famous KDD network data set. This data set deletes redundant data in the KDD data set, so the classifier will not be biased towards more frequent data, and the training set and test set data are more reasonable , So that the data set can be fully utilized. The KDD data set is the network data set used in the KDDCUP competition held in 1999. Although it is a bit old, the KDD data set is still the de facto benchmark in the field of network intrusion detection, laying the foundation for the research of network intrusion detec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network intrusion detection method based on double adaptive regularization online extreme learning machine; empirical risk and structural risk are fully balanced in calculation of output weight Beta, ridge regression factor C based on Tikhonov regularization is introduced, and over-fitting and ill-conditioned problems in network intrusion detection are eliminated. In the initial phase, samples are extracted randomly from NSL-KDD dataset as an initial training set, and the output weight Beta is adaptively initiated according to the size of the initial training set; in the continuous learning phase, optimized value of the ridge regression factor C is acquired by means of leave-one-out cross validation based on singular value decomposition and prediction sum of squares according to all the datasets currently acquired and is updated adaptively; the output weight Beta is adaptively updated according to the size of the dataset arrived each time. The network intrusion detection method based on double adaptive regularization online extreme learning machine is capable of detecting network intrusions efficiently and quickly, and generalization performance and real-time performance of the network intrusion detection algorithm are improved significantly.

Description

Technical field [0001] The invention belongs to the field of machine learning, and relates to a network intrusion detection method based on a double-adaptive regularized online extreme learning machine. Background technique [0002] With the continuous development of network technology and network scale, the Internet has been widely used in military, finance, e-commerce and other fields. More and more hosts and networks are being threatened by various network intrusion attacks, and information security has been elevated to a very important position. Network intrusion means that network attackers obtain illegal permissions through illegal means (such as decrypting passwords, electronic spoofing, etc.), and use these illegal permissions to enable network attackers to perform unauthorized operations on the attacked host, such as stealing User’s online banking account information, etc. The main ways of network intrusion are: password decryption, IP spoofing and DNS spoofing. Netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425
Inventor 康松林余懿邱贺
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products