Network intrusion detection using equality constrained-optimization-based extreme learning machines.
Cheng-Ru WangRong-Fang XuShie-Jue LeeChie-Hong LeePublished in: Knowl. Based Syst. (2018)
Keyphrases
- constrained optimization
- network intrusion detection
- extreme learning machines
- intrusion detection
- anomaly detection
- network intrusion
- objective function
- constrained optimization problems
- artificial immune
- unconstrained optimization
- network anomaly detection
- intrusion detection system
- fraud detection
- constraint handling
- network traffic
- interval analysis
- penalty functions
- network attacks
- penalty function
- iterative methods
- probabilistic model
- lagrange multipliers
- computer systems
- computer networks
- genetic algorithm