메뉴 건너뛰기




Volumn 42, Issue 8, 2015, Pages 4062-4080

MARK-ELM: Application of a novel multiple kernel learning framework for improving the robustness of network intrusion detection

Author keywords

Adaptive Boosting; Cyber security; Ensemble Learning; Extreme Learning Machine; Fractional Polynomial Kernels; KDD Cup 1999; Kernel Selection; Machine Learning; Multiclass Classification; Multiple Kernel Learning; Network Intrusion Detection

Indexed keywords

ADAPTIVE BOOSTING; ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; KNOWLEDGE ACQUISITION; LEARNING ALGORITHMS; LEARNING SYSTEMS; NETWORK SECURITY; NEURAL NETWORKS; SECURITY OF DATA; SUPPORT VECTOR MACHINES;

EID: 84961308100     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2014.12.040     Document Type: Article
Times cited : (93)

References (91)
  • 1
    • 79951578112 scopus 로고    scopus 로고
    • Design and analysis of genetic fuzzy systems for intrusion detection in computer networks
    • M.S. Abadeh, H. Mohamadi, and J. Habibi Design and analysis of genetic fuzzy systems for intrusion detection in computer networks Expert Systems with Applications 38 6 2011 7067 7075
    • (2011) Expert Systems with Applications , vol.38 , Issue.6 , pp. 7067-7075
    • Abadeh, M.S.1    Mohamadi, H.2    Habibi, J.3
  • 4
    • 79151484606 scopus 로고    scopus 로고
    • Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset
    • V. Bolón-Canedo, N. Sánchez-Maroño, and A. Alonso-Betanzos Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset Expert Systems with Applications 38 5 2011 5947 5957
    • (2011) Expert Systems with Applications , vol.38 , Issue.5 , pp. 5947-5957
    • Bolón-Canedo, V.1    Sánchez-Maroño, N.2    Alonso-Betanzos, A.3
  • 8
    • 79955702502 scopus 로고    scopus 로고
    • LIBSVM: A library for support vector machines
    • (accessed October 2013)
    • C.C. Chang, and C.J. Lin LIBSVM: A library for support vector machines ACM Transactions on Intelligent Systems and Technology (TIST) 2 3 2011 27 < http://www.csie.ntu.edu.tw/~cjlin/libsvm > (accessed October 2013)
    • (2011) ACM Transactions on Intelligent Systems and Technology (TIST) , vol.2 , Issue.3 , pp. 27
    • Chang, C.C.1    Lin, C.J.2
  • 10
    • 84899721363 scopus 로고    scopus 로고
    • Efficient classification using parallel and scalable compressed model and its application on intrusion detection
    • T. Chen, X. Zhang, S. Jin, and O. Kim Efficient classification using parallel and scalable compressed model and its application on intrusion detection Expert Systems with Applications 41 13 2014 5972 5983
    • (2014) Expert Systems with Applications , vol.41 , Issue.13 , pp. 5972-5983
    • Chen, T.1    Zhang, X.2    Jin, S.3    Kim, O.4
  • 12
    • 84893662789 scopus 로고    scopus 로고
    • Review and performance comparison of SVM-and ELM-based classifiers
    • J. Chorowski, J. Wang, and J.M. Zurada Review and performance comparison of SVM-and ELM-based classifiers Neurocomputing 128 2014 507 516
    • (2014) Neurocomputing , vol.128 , pp. 507-516
    • Chorowski, J.1    Wang, J.2    Zurada, J.M.3
  • 14
    • 84897137099 scopus 로고    scopus 로고
    • A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns
    • G. Creech, and J. Hu A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns IEEE Transactions on Computers 63 4 2013 513 529
    • (2013) IEEE Transactions on Computers , vol.63 , Issue.4 , pp. 513-529
    • Creech, G.1    Hu, J.2
  • 17
    • 84869029321 scopus 로고    scopus 로고
    • Extreme learning machines for intrusion detection systems
    • Springer Berlin Heidelberg
    • G.P.M. de Farias, A.L. de Oliveira, and G.G. Cabral Extreme learning machines for intrusion detection systems Neural information processing 2012, January Springer Berlin Heidelberg 535 543
    • (2012) Neural Information Processing , pp. 535-543
    • De Farias, G.P.M.1    De Oliveira, A.L.2    Cabral, G.G.3
  • 20
    • 0003893616 scopus 로고
    • Requirements and model for IDES - A real-time intrusion detection expert system
    • Document A005
    • Denning, D. E.; Neumann, P. G. (1985). Requirements and model for IDES - A real-time intrusion detection expert system. Document A005, SRI International, p. 333.
    • (1985) SRI International , pp. 333
    • Denning D. ., E.1    Neumann P. ., G.2
  • 21
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    • O. Depren, M. Topallar, E. Anarim, and M.K. Ciliz An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks Expert Systems with Applications 29 4 2005 713 722
    • (2005) Expert Systems with Applications , vol.29 , Issue.4 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Ciliz, M.K.4
  • 23
    • 84880499506 scopus 로고    scopus 로고
    • A novel extreme learning machine based on hybrid kernel function
    • S. Ding, Y. Zhang, X. Xu, and L. Bao A novel extreme learning machine based on hybrid kernel function Journal of Computers 8 8 2013 2110 2117
    • (2013) Journal of Computers , vol.8 , Issue.8 , pp. 2110-2117
    • Ding, S.1    Zhang, Y.2    Xu, X.3    Bao, L.4
  • 25
    • 84906542953 scopus 로고    scopus 로고
    • On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems
    • S. Elhag, A. Fernández, A. Bawakid, S. Alshomrani, and F. Herrera On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems Expert Systems with Applications 42 1 2015 193 202
    • (2015) Expert Systems with Applications , vol.42 , Issue.1 , pp. 193-202
    • Elhag, S.1    Fernández, A.2    Bawakid, A.3    Alshomrani, S.4    Herrera, F.5
  • 26
    • 79953303626 scopus 로고    scopus 로고
    • Exploring discrepancies in findings obtained with the KDD Cup'99 data set
    • V. Engen, J. Vincent, and K. Phalp Exploring discrepancies in findings obtained with the KDD Cup'99 data set Intelligent Data Analysis 15 2 2011 251 276
    • (2011) Intelligent Data Analysis , vol.15 , Issue.2 , pp. 251-276
    • Engen, V.1    Vincent, J.2    Phalp, K.3
  • 28
    • 0031211090 scopus 로고    scopus 로고
    • A decision-theoretic generalization of on-line learning and an application to boosting
    • Y. Freund, and R.E. Schapire A decision-theoretic generalization of on-line learning and an application to boosting Journal of Computer and System Sciences 55 1 1997 119 139
    • (1997) Journal of Computer and System Sciences , vol.55 , Issue.1 , pp. 119-139
    • Freund, Y.1    Schapire, R.E.2
  • 34
    • 84961369835 scopus 로고    scopus 로고
    • UCI KDD archive. < > (accessed May 2013)
    • Hettich, S.; Bay, S. D. (2013). KDD Cup dataset (1999): UCI KDD archive. < http://kdd.ics.uci.edu//databases/kddcup99/kddcup99.html > (accessed May 2013).
    • (2013) KDD Cup Dataset
    • Hettich, S.1    Bay, S.D.2
  • 35
    • 84942484786 scopus 로고
    • Ridge regression: Biased estimation for nonorthogonal problems
    • A.E. Hoerl, and R.W. Kennard Ridge regression: Biased estimation for nonorthogonal problems Technometrics 12 1 1970 55 67
    • (1970) Technometrics , vol.12 , Issue.1 , pp. 55-67
    • Hoerl, A.E.1    Kennard, R.W.2
  • 36
    • 84961371027 scopus 로고    scopus 로고
    • (accessed February 2013)
    • Hoi, Steven C. H. (2013). MKBoost matlab source code. < http://www.cais.ntu.edu.sg/~chhoi/mkboost/code/MKBoost.zip > (accessed February 2013).
    • (2013) MKBoost Matlab Source Code
    • Hoi Steven, C.H.1
  • 37
    • 77956613687 scopus 로고    scopus 로고
    • A novel intrusion detection system based on hierarchical clustering and support vector machines
    • S.J. Horng, M.Y. Su, Y.H. Chen, T.W. Kao, R.J. Chen, and J.L. Lai A novel intrusion detection system based on hierarchical clustering and support vector machines Expert Systems with Applications 38 1 2011 306 313
    • (2011) Expert Systems with Applications , vol.38 , Issue.1 , pp. 306-313
    • Horng, S.J.1    Su, M.Y.2    Chen, Y.H.3    Kao, T.W.4    Chen, R.J.5    Lai, J.L.6
  • 39
    • 0036505670 scopus 로고    scopus 로고
    • A comparison of methods for multiclass support vector machines
    • C.W. Hsu, and C.J. Lin A comparison of methods for multiclass support vector machines IEEE Transactions on Neural Networks 13 2 2002 415 425
    • (2002) IEEE Transactions on Neural Networks , vol.13 , Issue.2 , pp. 415-425
    • Hsu, C.W.1    Lin, C.J.2
  • 42
    • 84961302112 scopus 로고    scopus 로고
    • A tutorial in IJCNN2012/WCCI2012, Brisbane, Australia. < > (accessed on July 15, 2013)
    • Huang, G. B. (2012, June). Extreme learning machine: learning without iterative tuning. A tutorial in IJCNN2012/WCCI2012, Brisbane, Australia. < http://www.ntu.edu.sg/home/egbhuang/pdf/ELM-WCCI2012.pdf > (accessed on July 15, 2013).
    • (2012) Extreme Learning Machine: Learning Without Iterative Tuning
    • Huang, G.B.1
  • 43
    • 84906948723 scopus 로고    scopus 로고
    • An insight into extreme learning machines: Random neurons, random features and kernels
    • G.B. Huang An insight into extreme learning machines: Random neurons, random features and kernels Cognitive Computation 2014 1 15
    • (2014) Cognitive Computation , pp. 1-15
    • Huang, G.B.1
  • 45
    • 0034187311 scopus 로고    scopus 로고
    • Classification ability of single hidden layer feedforward neural networks
    • G.B. Huang, Y.Q. Chen, and H.A. Babri Classification ability of single hidden layer feedforward neural networks IEEE Transactions on Neural Networks 11 3 2000 799 801
    • (2000) IEEE Transactions on Neural Networks , vol.11 , Issue.3 , pp. 799-801
    • Huang, G.B.1    Chen, Y.Q.2    Babri, H.A.3
  • 46
    • 33745918399 scopus 로고    scopus 로고
    • Universal approximation using incremental constructive feedforward networks with random hidden nodes
    • G.B. Huang, L. Chen, and C.K. Siew Universal approximation using incremental constructive feedforward networks with random hidden nodes IEEE Transactions on Neural Networks 17 4 2006 879 892
    • (2006) IEEE Transactions on Neural Networks , vol.17 , Issue.4 , pp. 879-892
    • Huang, G.B.1    Chen, L.2    Siew, C.K.3
  • 53
    • 84922208776 scopus 로고    scopus 로고
    • Kernelized extreme learning machine with Levenberg-Marquardt learning approach towards intrusion detection
    • V. Jaiganesh, and P. Sumathi Kernelized extreme learning machine with Levenberg-Marquardt learning approach towards intrusion detection International Journal of Computer Applications 54 14 2012 38 44
    • (2012) International Journal of Computer Applications , vol.54 , Issue.14 , pp. 38-44
    • Jaiganesh, V.1    Sumathi, P.2
  • 54
    • 82255175861 scopus 로고    scopus 로고
    • A differentiated one-class classification method with applications to intrusion detection
    • I. Kang, M.K. Jeong, and D. Kong A differentiated one-class classification method with applications to intrusion detection Expert Systems with Applications 39 4 2012 3899 3905
    • (2012) Expert Systems with Applications , vol.39 , Issue.4 , pp. 3899-3905
    • Kang, I.1    Jeong, M.K.2    Kong, D.3
  • 55
    • 84961382638 scopus 로고    scopus 로고
    • (accessed January 2014)
    • KDD Website (2014). < http://www.kdd.org/kddcup/index.php > (accessed January 2014).
    • (2014) KDD Website
  • 57
    • 84865209539 scopus 로고    scopus 로고
    • A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
    • L. Koc, T.A. Mazzuchi, and S. Sarkani A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier Expert Systems with Applications 39 18 2012 13492 13500
    • (2012) Expert Systems with Applications , vol.39 , Issue.18 , pp. 13492-13500
    • Koc, L.1    Mazzuchi, T.A.2    Sarkani, S.3
  • 58
    • 80052025073 scopus 로고    scopus 로고
    • Self-adaptive and dynamic clustering for online anomaly detection
    • S. Lee, G. Kim, and S. Kim Self-adaptive and dynamic clustering for online anomaly detection Expert Systems with Applications 38 12 2011 14891 14898
    • (2011) Expert Systems with Applications , vol.38 , Issue.12 , pp. 14891-14898
    • Lee, S.1    Kim, G.2    Kim, S.3
  • 59
    • 37249038011 scopus 로고    scopus 로고
    • Kernel combination versus classifier combination
    • Springer Berlin Heidelberg
    • W.J. Lee, S. Verzakov, and R.P. Duin Kernel combination versus classifier combination Multiple classifier systems 2007 Springer Berlin Heidelberg 22 31
    • (2007) Multiple Classifier Systems , pp. 22-31
    • Lee, W.J.1    Verzakov, S.2    Duin, R.P.3
  • 60
    • 81855197007 scopus 로고    scopus 로고
    • An efficient intrusion detection system based on support vector machines and gradually feature removal method
    • Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai, and K. Dai An efficient intrusion detection system based on support vector machines and gradually feature removal method Expert Systems with Applications 39 1 2012 424 430
    • (2012) Expert Systems with Applications , vol.39 , Issue.1 , pp. 424-430
    • Li, Y.1    Xia, J.2    Zhang, S.3    Yan, J.4    Ai, X.5    Dai, K.6
  • 61
    • 3042674061 scopus 로고    scopus 로고
    • Gabor-based kernel PCA with fractional power polynomial models for face recognition
    • C. Liu Gabor-based kernel PCA with fractional power polynomial models for face recognition IEEE Transactions on Pattern Analysis and Machine Intelligence 26 5 2004 572 581
    • (2004) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.26 , Issue.5 , pp. 572-581
    • Liu, C.1
  • 62
    • 84863876822 scopus 로고    scopus 로고
    • A comparative analysis of support vector machines and extreme learning machines
    • X. Liu, C. Gao, and P. Li A comparative analysis of support vector machines and extreme learning machines Neural Networks 33 2012 58 66
    • (2012) Neural Networks , vol.33 , pp. 58-66
    • Liu, X.1    Gao, C.2    Li, P.3
  • 63
    • 26944498248 scopus 로고    scopus 로고
    • Comparison of extreme learning machine with support vector machine for text classification
    • Y. Liu, H.T. Loh, and S.B. Tor Comparison of extreme learning machine with support vector machine for text classification Innovations in Applied Artificial Intelligence 2005 390 399
    • (2005) Innovations in Applied Artificial Intelligence , pp. 390-399
    • Liu, Y.1    Loh, H.T.2    Tor, S.B.3
  • 65
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • J. McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory ACM Transactions on Information and System Security 3 4 2000 262 294
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 66
    • 81355151606 scopus 로고    scopus 로고
    • Random effects logistic regression model for anomaly detection
    • M.S. Mok, S.Y. Sohn, and Y.H. Ju Random effects logistic regression model for anomaly detection Expert Systems with Applications 37 10 2010 7162 7166
    • (2010) Expert Systems with Applications , vol.37 , Issue.10 , pp. 7162-7166
    • Mok, M.S.1    Sohn, S.Y.2    Ju, Y.H.3
  • 68
  • 71
    • 84876503003 scopus 로고    scopus 로고
    • Robust multiclass classification for learning from imbalanced biomedical data
    • P. Phoungphol, Y. Zhang, and Y. Zhao Robust multiclass classification for learning from imbalanced biomedical data Tsinghua Science and Technology 17 6 2012 619 628
    • (2012) Tsinghua Science and Technology , vol.17 , Issue.6 , pp. 619-628
    • Phoungphol, P.1    Zhang, Y.2    Zhao, Y.3
  • 72
    • 33748611921 scopus 로고    scopus 로고
    • Ensemble based systems in decision making
    • R. Polikar Ensemble based systems in decision making IEEE Circuits and Systems Magazine 6 3 2006 21 45
    • (2006) IEEE Circuits and Systems Magazine , vol.6 , Issue.3 , pp. 21-45
    • Polikar, R.1
  • 73
    • 84864758525 scopus 로고    scopus 로고
    • Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation
    • D.M. Powers Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation Journal of Machine Learning Technologies 2 1 2011 37 63
    • (2011) Journal of Machine Learning Technologies , vol.2 , Issue.1 , pp. 37-63
    • Powers, D.M.1
  • 74
    • 84896401783 scopus 로고    scopus 로고
    • A short note about the application of polynomial kernels with fractional degree in Support Vector Learning
    • Springer Berlin Heidelberg
    • R. Rossius, G. Zenker, A. Ittner, and W. Dilger A short note about the application of polynomial kernels with fractional degree in Support Vector Learning Machine Learning: ECML-98 1998 Springer Berlin Heidelberg 143 148
    • (1998) Machine Learning: ECML-98 , pp. 143-148
    • Rossius, R.1    Zenker, G.2    Ittner, A.3    Dilger, W.4
  • 76
    • 0025448521 scopus 로고
    • The strength of weak learnability
    • R.E. Schapire The strength of weak learnability Machine Learning 5 2 1990 197 227
    • (1990) Machine Learning , vol.5 , Issue.2 , pp. 197-227
    • Schapire, R.E.1
  • 78
    • 81855221688 scopus 로고    scopus 로고
    • Decision tree based light weight intrusion detection using a wrapper approach
    • S.S.S. Sindhu, S. Geetha, and A. Kannan Decision tree based light weight intrusion detection using a wrapper approach Expert Systems with Applications 39 1 2012 129 141
    • (2012) Expert Systems with Applications , vol.39 , Issue.1 , pp. 129-141
    • Sindhu, S.S.S.1    Geetha, S.2    Kannan, A.3
  • 79
    • 65649138430 scopus 로고    scopus 로고
    • A systematic analysis of performance measures for classification tasks
    • M. Sokolova, and G. Lapalme A systematic analysis of performance measures for classification tasks Information Processing and Management 45 4 2009 427 437
    • (2009) Information Processing and Management , vol.45 , Issue.4 , pp. 427-437
    • Sokolova, M.1    Lapalme, G.2
  • 80
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • IEEE
    • R. Sommer, and V. Paxson Outside the closed world: On using machine learning for network intrusion detection 2010 IEEE symposium on security and privacy (SP) 2010, May IEEE 305 316
    • (2010) 2010 IEEE Symposium on Security and Privacy (SP) , pp. 305-316
    • Sommer, R.1    Paxson, V.2
  • 83
    • 34547673383 scopus 로고    scopus 로고
    • Cost-sensitive boosting for classification of imbalanced data
    • Y. Sun, M.S. Kamel, A.K. Wong, and Y. Wang Cost-sensitive boosting for classification of imbalanced data Pattern Recognition 40 12 2007 3358 3378
    • (2007) Pattern Recognition , vol.40 , Issue.12 , pp. 3358-3378
    • Sun, Y.1    Kamel, M.S.2    Wong, A.K.3    Wang, Y.4
  • 84
    • 84896399398 scopus 로고    scopus 로고
    • Extension of a kernel-based classifier for discriminative spoken keyword spotting
    • S. Tabibian, A. Akbari, and B. Nasersharif Extension of a kernel-based classifier for discriminative spoken keyword spotting Neural Processing Letters 39 2 2014 195 218
    • (2014) Neural Processing Letters , vol.39 , Issue.2 , pp. 195-218
    • Tabibian, S.1    Akbari, A.2    Nasersharif, B.3
  • 86
    • 84941079784 scopus 로고    scopus 로고
    • A new approach to intrusion detection using artificial neural networks and fuzzy clustering
    • G. Wang, J. Hao, J. Ma, and L. Huang A new approach to intrusion detection using artificial neural networks and fuzzy clustering Expert Systems with Applications 37 9 2010 6225 6232
    • (2010) Expert Systems with Applications , vol.37 , Issue.9 , pp. 6225-6232
    • Wang, G.1    Hao, J.2    Ma, J.3    Huang, L.4
  • 87
    • 33745926790 scopus 로고    scopus 로고
    • Comparative study of extreme learning machine and support vector machine
    • Springer Berlin Heidelberg
    • X.K. Wei, Y.H. Li, and Y. Feng Comparative study of extreme learning machine and support vector machine Advances in neural networks-ISNN 2006 2006 Springer Berlin Heidelberg 1089 1095
    • (2006) Advances in Neural Networks-ISNN 2006 , pp. 1089-1095
    • Wei, X.K.1    Li, Y.H.2    Feng, Y.3
  • 90
    • 37749036828 scopus 로고    scopus 로고
    • Adaptive intrusion detection based on machine learning: Feature extraction, classifier construction and sequential pattern prediction
    • X. Xu Adaptive intrusion detection based on machine learning: Feature extraction, classifier construction and sequential pattern prediction International Journal of Web Services Practices 2 1-2 2006 49 58
    • (2006) International Journal of Web Services Practices , vol.2 , Issue.12 , pp. 49-58
    • Xu, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.