Analysis of Extreme Learning Machines (ELMs) for intelligent intrusion detection systems: A survey
Qasem Abu Al-Haija,Shahad Altamimi,Mazen AlWadi
DOI: https://doi.org/10.1016/j.eswa.2024.124317
IF: 8.5
2024-05-30
Expert Systems with Applications
Abstract:The ever-increasing interconnectedness of our world, fueled by technological advancements across industries, has made network security a paramount concern. This concern stems from the evolving tactics of cybercriminals and our dependence on interdependent systems. Extreme Learning Machines (ELMs) have recently been renamed Single-Hidden-Layer Feedforward Neural Networks (SLNFs) to achieve a rapid learning rate by randomly initializing weights and deviations. For a decade, researchers have been primarily focused on the investigations of ELM, which offers a distinctive use that prompted academics to investigate its possible application in various disciplines. Considering the Intrusion Detection System (IDS) framework, ELM provides an enticing path for constructing effective and adaptable IDS models capable of analyzing enormous amounts of network data in real-time. ELMs are based on feedforward networks using single or Multi-Hidden Layers (MHLs). ELM-based IDS assists in safeguarding networks, systems, and web applications against cyber-attacks, phishing, and cyber threats. As a result, during the last decade, ELM has taken center stage for development as an exciting technology for effective and accurate classification tasks. ELM represents a subset of the Machine Learning (ML) algorithms utilized by IDSs, which makes our work contribute significantly to the field of network security. First, we investigate the ELM-based IDS throughout the previous decade, including the idea, scope, and rationale of ELM. Second, our study aims to identify abnormal and malicious actions in network traffic while offering real-time protection against potential threats, including detecting Distributed Denial of Services (DDoS) attacks and phishing attacks that use malicious URLs and payloads for successful attacks. Finally, our work encompasses applications, extensions, attacks, security issues, and a comparative analysis showcasing the versatility of ELM within various algorithms. This underscores ELM's evolution as a promising technology for accurate and effective classification tasks, particularly in network security research.
computer science, artificial intelligence,engineering, electrical & electronic,operations research & management science