The architecture of ELM.

The architecture of ELM.

Source publication
Preprint
Full-text available
Ensuring a secure online environment hinges on the timely detection of network attacks. Nevertheless, existing detection methods often grapple with the delicate balance between speed and accuracy. In this paper, we introduce a novel intrusion detection algorithm that marries quantum particle swarm optimization with an extreme learning machine (QPSO...

Contexts in source publication

Context 1
... efficiency and generalization performance make ELM an attractive machine learning tool, particularly suitable for large-scale datasets and real-time applications that require fast training. The architecture of the Extreme Learning Machine (ELM) is shown in Figure 1. ...
Context 2
... sample number is set to 5000. The results are presented in Figure 10. The experimental findings denote that, in both scenarios of with and without feature selection, detection latency incrementally elevates in tandem with an increase in the number of ELM hidden nodes. ...
Context 3
... enhancement and mitigation are due to the reduction in computational load during Finally, we compared the Extreme Learning Machine optimized with quantum particle swarm optimization (Q-ELM) to the original Extreme Learning Machine (ELM) algorithm in terms of test accuracy when the number of training samples was 5000. The results shown in Figure 11 indicate that under the same training sample conditions, our proposed algorithm, optimized with quantum particle swarm optimization, can significantly improve training accuracy. ...

Similar publications

Preprint
Full-text available
Aiming at the intrusion detection model, there are problems such as single dimension of local feature extraction, prediction accuracy to be improved and high computational overhead of the model, an intrusion detection model based on Dilated Convolution Network (DCN) and Bidirectional Long Short Memory Network (BiLSTM) intrusion detection model. Fir...
Article
Full-text available
Ensuring a secure online environment hinges on the timely detection of network attacks. Nevertheless, existing detection methods often grapple with the delicate balance between speed and accuracy. In this paper, we introduce a novel intrusion detection algorithm that marries quantum particle swarm optimization with an extreme learning machine (QPSO...
Article
Full-text available
In recent years, frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace security. This paper presents a novel intrusion detection system consisting of a data preprocessing stage and a deep learning model for accurately identifying network attacks. We have proposed four deep neural network mod...