CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Host based Anomaly Detection using Fuzzy Genetic Approach (FGA)

by Harjinder Kaur, Nivit Gill
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 20
Year of Publication: 2013
Authors: Harjinder Kaur, Nivit Gill
10.5120/13024-0026

Harjinder Kaur, Nivit Gill . Host based Anomaly Detection using Fuzzy Genetic Approach (FGA). International Journal of Computer Applications. 74, 20 ( July 2013), 5-9. DOI=10.5120/13024-0026

@article{ 10.5120/13024-0026,
author = { Harjinder Kaur, Nivit Gill },
title = { Host based Anomaly Detection using Fuzzy Genetic Approach (FGA) },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 20 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number20/13024-0026/ },
doi = { 10.5120/13024-0026 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:42:48.224527+05:30
%A Harjinder Kaur
%A Nivit Gill
%T Host based Anomaly Detection using Fuzzy Genetic Approach (FGA)
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 20
%P 5-9
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion is a fast growing security threat to the computers which fails the security of the system. The researchers have proposed number of techniques such as firewall, encryption etc. to prevent such penetration and protect the systems. With all these measures also, the intruders managed to penetrate the computers. Intrusion detection systems (IDS) monitor the resources of the computer, detect the malicious/suspicious activity either on a single machine or on the network which is different from the legitimate user activity and send the reports of such activity. The paper proposes to detect anomalous user behavior on a single machine based on the system log files using fuzzy logic and genetic algorithms.

References
  1. Sanoop Mallissery, Jeewan Prabhu, and Raghavendra Ganiga, "Survey on Intrusion Detection Methods," in proc. of 3rd Int. Conf. on Advances in Recent Technologies in Communication and Computing, Bangalore, 2011, pp. 224-228.
  2. Asmaa Shaker Ashoor and Sharad Gore, "Intrusion Detection System: Case study," in International Conference on Advanced Materials Engineering, vol. 15, Singapore, 2011, pp. 6-9.
  3. V Jyothsna, V V Ramaprasad, and K Munivara Prasad, "A Review of Anomaly based Intrusion Detection Systemss," International Journal of Computer Applications, vol. 28, no. 7, pp. 26-35, August 2011.
  4. P Garcia Teodoro, J Diaz Verdejo, G Macia Fernandez, and E Vazquez, "Anomaly based network intrusion detection: Techniques, Systems and Challenges," International Jouirnal of Computers and Security, vol. 28, no. 1, pp. 18-28, February-March 2009.
  5. Bharanidharan Shanmugam and Norbrik Bashah Idris, "Hybrid Intrusion Detection Systems(HIDS) using Fuzzy Logic," in Intrusion Detection Systems, Dr. Pawel Skrobanek, Ed. Croatia, Europe: InTech, 2011, ch. 8, pp. 135-155.
  6. Mostaque Md. Morshedur Hassan, "Current Studies on Intrusion Detection System, Genetic Algorithm and Fuzzy Logic," International Journal of Distributed and Parallel Systems (IJDPS), vol. 4, no. 2, pp. 35-47, March 2013.
  7. Lin Ying, Zhang Yan, and Ou Yang Jia, "The Design and Implementation of Host-based Intrusion Detection System," in 3rd International Symp. on Intelligent Information Technology and Security Informatics, Jinggangshan, 2010, pp. 595-598.
  8. S. V. Wong and A. M. S Hamouda, "Optimization of fuzzy rules design using genetic algorithm," Advances in Engineering Software, vol. 31, no. 4, pp. 251-262, April 2000.
  9. Anne Magaly, "Combining Neural Networks and Fuzzy Logic for Applications in Character Recognition," University of Kent, Canterbury, PhD Thesis 2001.
  10. Mathworks, Fuzzy Logic Toolbox User's Guide. Natick, United States: Mathworks Inc. , 2012.
  11. Mathworks, Genetic Algorithm and Direct search toolbox For use with Matlab. Natick, United States: Mathworks Inc. , version 1, 2004.
  12. Rajdeep Borgohain, "FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems," International Journal of Advanced Networking and Applications, vol. 3, no. 6, pp. 1409-1415, 2012.
  13. Adel Nadjaran Toosi, Mohsen Kahani, "A new approach to intrusion detection based on an evolutionary soft computing model using neurofuzzy classifiers," Computer Communications, vol. 30, no. 10, pp. 2201–2212, 2007.
  14. Suhail Owais, Vaclav Snasel, Pavel Kromer, Ajith Abraham, "Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques," 7th Computer Information Systems and Industrial Management Applications, Ostrava, pp. 300-307, 2008.
  15. N. Benamrane, A. Aribi, L. Kraoula, "Fuzzy Neural Networks and Genetic Algorithms for Medical Images Interpretation," Conference on Geometric Modeling and Imaging--New Trends, London, pp. 259-264, 2006.
  16. Jian Xu, Jing You, and Fengyu Liu, "A Fuzzy Rules based Approach for Performance Anomaly Detection," proc. of IEEE Networking, Sensing and Control, pp. 44-48, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Signature/Misuse Anomaly Fuzzy Logic and Genetic Algorithm