CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm

by Swati Paliwal, Ravindra Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 60 - Number 19
Year of Publication: 2012
Authors: Swati Paliwal, Ravindra Gupta
10.5120/9813-4306

Swati Paliwal, Ravindra Gupta . Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm. International Journal of Computer Applications. 60, 19 ( December 2012), 57-62. DOI=10.5120/9813-4306

@article{ 10.5120/9813-4306,
author = { Swati Paliwal, Ravindra Gupta },
title = { Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 60 },
number = { 19 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 57-62 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume60/number19/9813-4306/ },
doi = { 10.5120/9813-4306 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:07:39.665710+05:30
%A Swati Paliwal
%A Ravindra Gupta
%T Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 60
%N 19
%P 57-62
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. To control these threats, recognition of attacks is critical matter. Probing, Denial of Service (DoS), Remote to User (R2L) Attacks are some of the attacks which affects large number of computers in the world daily. Detection of these attacks and prevention of computers from it is a major research topic for researchers throughout the world. In this paper idea for use of a Genetic Algorithm (GA) based approach for generation of rules to detect Probing, DoS and R2L attacks on the system is proposed.

References
  1. M. Botha, R. Solms, "Utilizing Neural Networks For Effective Intrusion Detection", ISSA,2004.
  2. R. Graham, "FAQ: Network Intrusion Detection Systems". March 21, 2000.
  3. Chittur A. "Model Generation for an Intrusion Detection System Using Genetic Algorithms, publications/gaids-thesis01. pdf, accessed in 2006.
  4. B. Uppalaiah, 2K. Anand, 3B. Narsimha, 4S. Swaraj, 5T. Bharat,"Genetic Algorithm Approach to Intrusion Detection System", IJCST Vol. 3, Issue 1, Jan. - March 2012.
  5. Mr. Anurag Andhare,Prof. Arvind Bhagat Patil," Denial-of-Service Attack Detection Using Genetic-Based Algorithm", International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 2, Issue 2, Mar-Apr 2012, pp. 094-098.
  6. KDD cup 1999 data, http:// kdd. ics. uci. edu/ databases/kddcup99/kddcup99. html
  7. Mohammad Sazzadul Hoque1, Md. Abdul Mukit2 and Md. Abu Naser Bikas3," An Implementation of Intrusion Detection System Using Genetic Algorithm", International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 2, March 2012.
  8. T. Xiao, G. Qu, S. Hariri, and M. Yousif, "AnbEfficient Network Intrusion Detection Method Based on Information Theory and Genetic Algorithm", Proceedings of the 24th IEEE International Performance Computing and Communications Conference (IPCCC '05), Phoenix, AZ, USA. 2005. Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Net.
  9. W. Li, "Using Genetic Algorithm for Network Intrusion Detection". "A Genetic Algorithm Approach to Network Intrusion Detection". SANS Institute, USA, 2004.
  10. R. H. Gong, M. Zulkernine, P. Abolmaesumi, "A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection", 2005.
  11. Bridges, Susan, Rayford B. Vaughn,"Intrusion Detection via Fuzzy Data Mining", In Proceedings of 12th Annual Canadian Information Technology Security Symposium, pp. 109-122, Ottawa, Canada, 2000.
  12. Selvakani S, R. S. Rajesh," Genetic Algorithm for framing rules for Intrusion Detection", IJCSNS, Vol. 7, No. 11, 2007.
  13. W. Lu, I. Traore,"Detecting new forms of network intrusion using genetic programming", Computational Intelligence Vol. 20, Issue 3, 2004, pp. 475-494.
  14. Crosbie, Mark, Gene Spafford,"Applying Genetic Programming to Intrusion Detection", In Proceeding of 1995 AAAI Fall Symposium on Genetic Programming, pp. 1-8, Cambridge, Massachusetts, 1995.
  15. Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi," A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection".
  16. Gong RH, Zulkernine M, Abolmaesumi P. "A Software Implementation of a Genetic Algorithm based approach to Network Intrusion Detection". In: Proceedings of the sixth international conference on software engineering, artificial intelligence, networking and parallel/distributed computing and first ACIS international workshop on self-assembling wireless networks (SNPD/SAWN„05), 2005.
  17. Middlemiss M and Dick G, "Feature Selection of Intrusion detection data using a hybrid genetic of hybrid Intelligent systems, IOS Press Amsterdam, PP. 519-527, 2003
Index Terms

Computer Science
Information Sciences

Keywords

Probing Denial of Service and Remote to User attacks Genetic Algorithm Intrusion Detection System Rule Set KDD Cup 99 Dataset