CFP last date
20 May 2024
Reseach Article

Anomaly based Intrusion Detection System using Genetic Algorithm and K-Centroid Clustering

by Biswapriyo Chakrabarty, Omit Chanda, Md. Saiful Islam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 163 - Number 11
Year of Publication: 2017
Authors: Biswapriyo Chakrabarty, Omit Chanda, Md. Saiful Islam
10.5120/ijca2017913762

Biswapriyo Chakrabarty, Omit Chanda, Md. Saiful Islam . Anomaly based Intrusion Detection System using Genetic Algorithm and K-Centroid Clustering. International Journal of Computer Applications. 163, 11 ( Apr 2017), 13-17. DOI=10.5120/ijca2017913762

@article{ 10.5120/ijca2017913762,
author = { Biswapriyo Chakrabarty, Omit Chanda, Md. Saiful Islam },
title = { Anomaly based Intrusion Detection System using Genetic Algorithm and K-Centroid Clustering },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 163 },
number = { 11 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 13-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume163/number11/27438-2017913762/ },
doi = { 10.5120/ijca2017913762 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:09:54.972236+05:30
%A Biswapriyo Chakrabarty
%A Omit Chanda
%A Md. Saiful Islam
%T Anomaly based Intrusion Detection System using Genetic Algorithm and K-Centroid Clustering
%J International Journal of Computer Applications
%@ 0975-8887
%V 163
%N 11
%P 13-17
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet is being expanded because of the enhancement of today’s networks and with these expansion different types of unauthorized activities building up to make the network vulnerable. Many researchers are working around the world to protect the systems from any kind of unauthorized access. In this study we have implemented an Intrusion Detection System based on K-Centroid Clustering and Genetic Algorithm to achieve a better detection rate and false positive rate. In our system training set is classified into different clusters based on K-Centroid clustering and then GA is performed to check each connection of the test set and finally result has been obtained for every specific connection. We have used both Kdd99Cup and NSLKDD dataset to get the experiment result of our system. Finally analyzing with those data we have got a decent detection rate in our implemented system.

References
  1. Zorana Bankovic, Dusan Stepanovic, Slobodan Bojanic, Octavio Nieto-Taladriz. “Improving network security using genetic algorithm approach”, Computers and Electrical Engineering, Pg 438-451, July 2007.
  2. S.Owais, V.Snasel, P.Kromer and A. Abraham, “Survey Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques”, 7 th Computer Information Systems and Industrial Management Applications, 2008, IEEE , pp.300-307.
  3. A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi
  4. Chittur A. Model Generation for an Intrusion Detection System Using Genetic Algorithms, http://www1.cs.columbia.edu/ids/publications/gaids-thesis01.pdf, accessed in 2006.
  5. W. Li, “Using Genetic Algorithm for Network Intrusion Detection”. “A Genetic Algorithm Approach to Network Intrusion Detection”. SANS Institute, USA, 2004.
  6. W. Lu, I. Traore, “Detecting New Forms of Network Intrusion Using Ge-netic Programming”. Computational Intelligence, vol. 20, pp. 3, Blackwell Publishing, Malden, pp. 475-494, 2004.
  7. Jonatan Gomez and Dipankar Dasgupta. Evolving fuzzy classifiers for intrusion detection. In Proceedings of the 2002 IEEE Workshop on Information Assurance, West Point, NY, USA, 2002.
  8. S. Selvakani Kandeeban & R. S. Rajesh, “A Mutual Construction for IDS Using GA”, 2011
  9. M. Crosbie and E. Spafford, “Applying Genetic Programming to Intrusion Detection”, Proceedings of the AAAI Fall Symposium, 1995
  10. Gang Wang, Jinxing Hao, Jian Ma, Lihua Huang, “A new approach to intrusion detection using Artificial Neural Networks and fuzzy cluster-ing”.
  11. KDD cup 1999 data http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
  12. M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, “A Detailed Analysis of the KDD CUP 99 Data Set,” Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2009.
  13. http://nsl.cs.unb.ca/NSL-KDD/
  14. A COMPARISON STUDY FOR INTRUSION DATABASE (KDD99, NSL-KDD) BASED ON SELF ORGANIZATION MAP (SOM) ARTIFICIAL NEURAL NETWORK
  15. B. Abdullah, I. Abd-alghafar, Gouda I. Salama, A. Abd-alhafez, “Per-formance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System”, 2009’
  16. Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas , “AN IMPLEMENTATION OF INTRUSION DETECTION SYS-TEM USING GENETIC ALGORITHM” , Dept. of Computer Science & Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh.
Index Terms

Computer Science
Information Sciences

Keywords

Computer Security Intrusion Detection Intrusion Detection Systems Genetic Algorithm K-centroid Clustering