A survey on performance comparison of support vecr machine, random forest, and extreme learning machine for intrusion detection

2021 ◽  
Author(s):  
Gattineni Pradeep ◽  
G. R. Sakthidharan
2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Yumin Dong ◽  
Wanbin Hu ◽  
Jinlei Zhang ◽  
Min Chen ◽  
Wei Liao ◽  
...  

Energies ◽  
2019 ◽  
Vol 12 (7) ◽  
pp. 1223 ◽  
Author(s):  
Jianlei Gao ◽  
Senchun Chai ◽  
Baihai Zhang ◽  
Yuanqing Xia

Recently, network attacks launched by malicious attackers have seriously affected modern life and enterprise production, and these network attack samples have the characteristic of type imbalance, which undoubtedly increases the difficulty of intrusion detection. In response to this problem, it would naturally be very meaningful to design an intrusion detection system (IDS) to effectively and quickly identify and detect malicious behaviors. In our work, we have proposed a method for an IDS-combined incremental extreme learning machine (I-ELM) with an adaptive principal component (A-PCA). In this method, the relevant features of network traffic are adaptively selected, where the best detection accuracy can then be obtained by I-ELM. We have used the NSL-KDD standard dataset and UNSW-NB15 standard dataset to evaluate the performance of our proposed method. Through analysis of the experimental results, we can see that our proposed method has better computation capacity, stronger generalization ability, and higher accuracy.


2019 ◽  
Vol 2019 ◽  
pp. 1-17
Author(s):  
Ju-Young Shin ◽  
Yonghun Ro ◽  
Joo-Wan Cha ◽  
Kyu-Rang Kim ◽  
Jong-Chul Ha

Machine learning algorithms should be tested for use in quantitative precipitation estimation models of rain radar data in South Korea because such an application can provide a more accurate estimate of rainfall than the conventional ZR relationship-based model. The applicability of random forest, stochastic gradient boosted model, and extreme learning machine methods to quantitative precipitation estimation models was investigated using case studies with polarization radar data from Gwangdeoksan radar station. Various combinations of input variable sets were tested, and results showed that machine learning algorithms can be applied to build the quantitative precipitation estimation model of the polarization radar data in South Korea. The machine learning-based quantitative precipitation estimation models led to better performances than ZR relationship-based models, particularly for heavy rainfall events. The extreme learning machine is considered the best of the algorithms used based on evaluation criteria.


2018 ◽  
Vol 10 (5) ◽  
pp. 848-863 ◽  
Author(s):  
Buse Gul Atli ◽  
Yoan Miche ◽  
Aapo Kalliola ◽  
Ian Oliver ◽  
Silke Holtmanns ◽  
...  

Network along with Security is most significant in the digitalized environment. It is necessary to secure data from hackers and intruders. A strategy involved in protection of information from hackers will be termed as Intrusion Detection System (IDS).By taking into nature of attack or the usual conduct of user, investigation along with forecasting activities of the clients will be performed by mentioned system.Variousstrategies are utilized for the intrusion detection system. For the purpose of identification of hacking activity, utilization of machine learning based approach might be considered as novel strategy.In this paper, for identification of the hacking activity will be carried out by Twin Extreme Learning Machines (TELM).Employing the concept of Twin Support Vector Machine with the fundamental structure of Extreme Learning Machine is considered in the establishment of Twin Extreme Learning Machine (TELM).Also, its performance and accuracy are compared with the other intrusion detection techniques


Sign in / Sign up

Export Citation Format

Share Document