메뉴 건너뛰기




Volumn 2014-November, Issue November, 2014, Pages 73-82

Using extreme learning machine for intrusion detection in a big data environment

Author keywords

Big data; Classification; Extreme learning machine; Intrusion detection; Mapreduce

Indexed keywords

BIG DATA; CLASSIFICATION (OF INFORMATION); INTRUSION DETECTION; KNOWLEDGE ACQUISITION; LARGE DATASET; MACHINE LEARNING; NETWORK SECURITY;

EID: 84937721236     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2666652.2666664     Document Type: Conference Paper
Times cited : (32)

References (21)
  • 1
    • 84865090469 scopus 로고    scopus 로고
    • "KDDcup dataset, " 1999. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
    • (1999) KDDcup Dataset
  • 2
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • S. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review, " Applied Soft Computing, vol. 10, no. 1, pp. 1-35, 2010.
    • (2010) Applied Soft Computing , vol.10 , Issue.1 , pp. 1-35
    • Wu, S.1    Banzhaf, W.2
  • 3
    • 33745918399 scopus 로고    scopus 로고
    • Universal approximation using incremental constructive feedforward networks with random hidden nodes
    • Z. Q.-Y. Huang, G.B. and C.-K. Siew, "Universal approximation using incremental constructive feedforward networks with random hidden nodes, " IEEE Transactions on Neural Networks, vol. 17, no. 4, pp. 879-892, 2006.
    • (2006) IEEE Transactions on Neural Networks , vol.17 , Issue.4 , pp. 879-892
    • Huang, Z.Q.-Y.1    Siew, C.-K.2
  • 6
    • 84904208174 scopus 로고    scopus 로고
    • Big data analytics for security intelligence
    • Big Data Working Group, Retrieved January 3, 2014
    • Big Data Working Group, "Big data analytics for security intelligence, " 2013. CSA Cloud Security Alliance, Retrieved January 3, 2014, fromhttps://downloads.cloudsecurityalliance.org/initiatives/bdwg/Big-Data-Analytics-for-Security-Intelligence.pdf.
    • (2013) CSA Cloud Security Alliance
  • 8
    • 37549003336 scopus 로고    scopus 로고
    • Mapreduce: Simplified data processing on large clusters
    • Jan
    • J. Dean and S. Ghemawat, "Mapreduce: Simplified data processing on large clusters, " Communications of the ACM, vol. 51, pp. 107-113, Jan. 2008.
    • (2008) Communications of the ACM , vol.51 , pp. 107-113
    • Dean, J.1    Ghemawat, S.2
  • 9
    • 84937708755 scopus 로고    scopus 로고
    • The apache software foundation
    • The Apache Software Foundation, "Welcome to Apache Hadoop!, " 2013.
    • (2013) Welcome to Apache Hadoop
  • 11
    • 84899721363 scopus 로고    scopus 로고
    • Efficient classification using parallel and scalable compressed model and its application on intrusion detection
    • T. Chen, X. Zhang, S. Jin, and O. Kim, "Efficient classification using parallel and scalable compressed model and its application on intrusion detection, " Expert Systems with Applications, vol. 41, no. 13, pp. 5972-5983, 2014.
    • (2014) Expert Systems with Applications , vol.41 , Issue.13 , pp. 5972-5983
    • Chen, T.1    Zhang, X.2    Jin, S.3    Kim, O.4
  • 14
    • 84897137099 scopus 로고    scopus 로고
    • A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns
    • G. Creech and J. Hu, "A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns, " IEEE Transaction on Computers, vol. 63, no. 4, pp. 807-819, 2014.
    • (2014) IEEE Transaction on Computers , vol.63 , Issue.4 , pp. 807-819
    • Creech, G.1    Hu, J.2
  • 15
    • 84870243622 scopus 로고    scopus 로고
    • Parallel extreme learning machine for regression based on mapreduce
    • Feb
    • Q. He, T. Shang, F. Zhuang, and Z. Shi, "Parallel extreme learning machine for regression based on mapreduce, " Neurocomputing, vol. 102, pp. 52-58, Feb. 2013.
    • (2013) Neurocomputing , vol.102 , pp. 52-58
    • He, Q.1    Shang, T.2    Zhuang, F.3    Shi, Z.4
  • 18
    • 33745903481 scopus 로고    scopus 로고
    • Extreme learning machine: Theory and applications
    • G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, "Extreme learning machine: Theory and applications, " Neurocomputing, vol. 70, no. 1-3, pp. 489-501, 2006.
    • (2006) Neurocomputing , vol.70 , Issue.1-3 , pp. 489-501
    • Huang, G.-B.1    Zhu, Q.-Y.2    Siew, C.-K.3
  • 19
  • 21
    • 84899750288 scopus 로고    scopus 로고
    • Improving the intrusion detection systems' performance by correlation as a sample selection method
    • R. Rouhi, F. Keynia, and M. Amiri, "Improving the intrusion detection systems' performance by correlation as a sample selection method, " Journal of Computer Sciences and Applications, vol. 1, no. 3, pp. 33-38, 2013.
    • (2013) Journal of Computer Sciences and Applications , vol.1 , Issue.3 , pp. 33-38
    • Rouhi, R.1    Keynia, F.2    Amiri, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.