Network Intrusion Detection Systems Using Genetic Algorithm

sabbithi suresh kumar, T Rajendra Prasad

Abstract


Intruder Detection system is so important implementations which considers all network information like temporal and spatial which make the system to build the rule for IDS. This helps for the administrator to detect complex anomalous behaviors of the system. This work is focused on the TCP/IP network protocols.

 

Genetic Algorithm is used to generate dynamic IP for the network to avoid unauthorized data transfer and prevent from attack. The Intrusion Detection System can be viewed as a rule-based system (RBS) and Genetic Algorithm can be viewed as a tool to help generate knowledge for the RBS. This project shows how network connection information can be modeled as chromosomes and how the parameters in genetic algorithm can be defined in this respect.

 


Keywords


IDS, GA, RBS, TCP/IP

References


M. Botha, R. Solms, “Utilizing Neural Networks For Effective Intrusion Detection”, ISSA,2004.

R. Graham, “FAQ: Network Intrusion Detection Systems”. March 21, 2000.

D. Zamboni, “Using Internal Sensors For Computer Intrusion Detection”. Center for Education

and Research in Information Assurance and Security, Purdue University. August 2001.

K. Scarfone, P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS)”. Computer Security Resource Center (National Institute of Standards and Technology). February 2007.

A. Chittur, “Model Generation for an Intrusion Detection System Using Genetic Algorithms”. January 2005.

W. Li, “Using Genetic Algorithm for Network Intrusion Detection”. “A Genetic Algorithm Approach to Network Intrusion Detection”. SANS Institute, USA, 2004.

W. Lu, I. Traore, “Detecting New Forms of Network Intrusion Using Genetic Programming”. Computational Intelligence, vol. 20, pp. 3, Blackwell Publishing, Malden, pp. 475-494, 2004.

M. M. Pillai, J. H. P. Eloff, H. S. Venter, “An Approach to Implement a Network Intrusion Detection System using Genetic Algorithms”, Proceedings of SAICSIT, pp:221-228, 2004.

S. M. Bridges, R. B. Vaughn, “Fuzzy Data Mining And Genetic Algorithms Applied To Intrusion Detection”, Proceedings of 12th Annual Canadian Information Technology Security Symposium, pp. 109-122, 2000.

J. Gomez, D. Dasgupta, “Evolving Fuzzy Classifiers for Intrusion Detection”, Proceedings of the IEEE, 2002.

M. Middlemiss, G. Dick, “Feature selection of intrusion detection data using a hybrid genetic algorithm/KNN approach”, Design and application of hybrid intelligent systems, IOS Press Amsterdam, pp.519-527, 2003.

Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, “Intrusion detection using an ensemble of intelligent paradigms”, Journal of Network and Computer Applications, Volume 28, Issue 2, April 2005, Pages 167-182

S. Peddabachigari, Ajith Abraham, C. Grosan, J.Thomas, “Modeling intrusion detection system using hybrid intelligent systems”, Journal of Network and Computer Applications, Volume 30, Issue 1, January 2007, Pages 114–132

M. Saniee Abadeh, J. Habibi, C. Lucas, “Intrusion detection using a fuzzy genetics-based learning algorithm”, Journal of Network and Computer Applications, Volume 30, Issue 1, January 2007,Pages 414-428

Tao Peng, C. Leckie, Kotagiri Ramamohanarao, “Information sharing for distributed intrusion detection systems”, Journal of Network and Computer Applications, Volume 30, Issue 3, August 2007, Pages 877–899


Full Text: PDF [FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.