Abstract
In recent years, intrusion detection systems (IDSs) have increasingly come to be regarded as a significant method due to their potential to develop into a key component that is necessary for the safety of computer networks. This work focuses on the usage of extreme learning machines, which are also known as ELMs, with the purpose of spotting prospective intrusions and assaults. The proposed method combines the self-adaptive differential evolution method for optimising network input weights and hidden node biases and multi-node probabilistic approach with the extreme learning machine for deriving network output weights. This body of work presents an innovative method of learning that can be put into practice in order to determine whether or not an incursion has taken place in the system that is the focus of the investigation that is being carried out by this body of work. A hybrid extreme learning machine is used in the execution of this strategy. When there is one thousand times more traffic on a network, the ability of regular IDS systems to detect malicious network intrusions is lowered by a factor of one hundred. This is because there are less opportunities to detect the intrusions. This is due to the fact that there are less probabilities to identify potential dangers. This paper lays the groundwork for a novel methodology for identifying malicious network breaches. The findings of the simulation demonstrated that putting into practice the approach that was proposed resulted in an improvement in the accuracy of the scenario's classification while it was being investigated. The implementation of the method seems to have produced the desired results.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: EURASIP Journal on Wireless Communications and Networking
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.