CFP last date
20 May 2024
Reseach Article

Using Enumeration in a GA based Intrusion Detection

by S. N. Pawar, R. S. Bichkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 56 - Number 15
Year of Publication: 2012
Authors: S. N. Pawar, R. S. Bichkar
10.5120/8971-3217

S. N. Pawar, R. S. Bichkar . Using Enumeration in a GA based Intrusion Detection. International Journal of Computer Applications. 56, 15 ( October 2012), 44-48. DOI=10.5120/8971-3217

@article{ 10.5120/8971-3217,
author = { S. N. Pawar, R. S. Bichkar },
title = { Using Enumeration in a GA based Intrusion Detection },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 56 },
number = { 15 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 44-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume56/number15/8971-3217/ },
doi = { 10.5120/8971-3217 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:58:58.108559+05:30
%A S. N. Pawar
%A R. S. Bichkar
%T Using Enumeration in a GA based Intrusion Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 56
%N 15
%P 44-48
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the last few years there has been a tremendous increase in connectivity between systems which has brought about limitless possibilities and opportunities. Unfortunately security related problems have also increased at the same rate. Computer systems are becoming increasingly vulnerable to attacks. These attacks or intrusions based on flaws in operating system or application programs usually read or modify confidential information or render the system useless. Different soft computing techniques are used for network intrusion detection (NID). This paper presents an effective GA based approach to generate the classification rules for network intrusion detection. While applying GA an, enumeration technique is used to select the gene values in a chromosome. This enumeration technique substantially reduces the computational time required for population generation and yields more appropriate rules. These rules are then used to detect the network intrusions. Experimental results show that this technique is more effective in detecting intrusions.

References
  1. A. Vesely, D. Brechlerova, "Neural Networks in Intrusion Detection Systems", AGRIC. ECON. CZECH, 50, 2004 (1):35-39.
  2. S. Owais, V. Snasel and P. Kromer, A. Abraham, "Survey Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques", 7th Computer Information Systems and Industrial Management Applications, 2008, IEEE press, June2008, pp. 300-307, DOI 10. 1109/CISIM. 2008. 49.
  3. Yong Wang, Dawu Gu, Xiuxia Tian, Jing Li, "Genetic Algorithm Rule Definition for Denial of Services Network Intrusion Detection", International Conference on Computational Intelligence and Natural Computing, IEEE, 2009, pp. 99-102.
  4. Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi, "A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection", SNPD/SAWN'05, IEEE, 2005.
  5. Srinivas Mukkamala and Andrew H. Sung, "A Comparative Study of Techniques for Intrusion Detection", Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'03), IEEE, 2003.
  6. Saqib Ashfaq, M. Umar Farooq, Asim Karim, "Efficient Rule Generation for Cost-Sensitive Misuse Detection Using Genetic Algorithms," IEEE, 2006
  7. Tao Xia, Guangzhi Qu, Salim Hariri, Mazin Yousif, "An efficient Network Intrusion Detection Method Based on Information Theory and Genetic Algorithm", IEEE, 2005.
  8. Melanie Middlemiss, Grant Dick, "Weighted Feature Extraction Using a Genetic Algorithm for Intrusion Detection", 2003 Congress on Evolutionary Computation (cec-03) 2003, pp. 1669-1675.
  9. Chi Hoon Lee, Sung Woo Shin and Jin Wook Chung, "Network Intrusion Detection Through Genetic Feature Selection", SNPD, IEEE, 2006.
  10. Biswanath Mukherjee, L. Todd Herberlein and Karl N. Levitt, "Network Intrusion Detection", IEEE Network, 8(3):26-41, May/June 1994.
  11. Jiu-Ling Zhao, Jiu–Fen Zhao, Jian –Jun Li, "Intrusion Detection Based on Clustering Genetic Algorithm", International Conference Based on Machine Learning and, Cybernetics, IEEE, Guangzhou, 2005, pp. 3911- 3914.
  12. Chen Zhongmin, Feng Jianyuan, Xu Sheng, Xu Renzuo, "The Research of Intrusion Detection Technology Based on Genetic Algorithms," International Conference on Networks Security, Wireless Communications and Trusted Computing, IEEE, 2009.
  13. MIT Lincoln Laboratory, DARPA datasets, MIT, USA, http://www. ll. mit. edu/mission/communications/ist/ corpora/ideval/data/1998data. html
  14. Wei Li, "Using Genetic Algorithm for Network Intrusion Detection," Proceedings of the United States Department of Energy Cyber Security Group, 2004.
  15. Jing Xiaopei, Wang Houxiang, Han Ruofei, Li Juan, "Improved Genetic Algorithm in Intrusion Detection Model Based on Artificial Immune Theory," IEEE, 2009
  16. Hua Zhou, Xiangru Meng, Li Zhang, "Application of Support Vector Machine and Genetic Algorithm to Network Intrusion Detection," IEEE, 2007
  17. Shingo Mabu, Ci Chen, Nannan Lu, Kaoru Shimada, and Kotaro Hirasawa, "An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming," IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews. IEEE, 2010
  18. Yu-Ping Zhou, Jian-An Fang, Dong-Mei Yu, "Research on Fuzzy Genetics-Based Rule Classifier in Intrusion Detection System," 2008 International Conference on Intelligent Computation Technology and Automation. DOI 10. 1109/ICICTA. 2008. 241. IEEE, 2008
Index Terms

Computer Science
Information Sciences

Keywords

Genetic Algorithms Intrusion detection Enumeration