Effective Intrusion Detection Systems using Genetic Algorithm

Mr. Prakash N. Kalavadekar, Dr.Shirish S. Sane

Abstract


Conventional methods of intrusion prevention like
firewalls, cryptography techniques, have not proved themselves to
completely defend networks and systems from newly generated
malwares and attacks. Intrusion Detection Systems (IDS) are
useful to find the correct solution to solve the current problems and became an important part of any security network
infrastructure to detect these threats without generating any
problem to network. The basic purpose of IDS is to detect attacks
and their nature that may harm the computer system. Several
different approaches for intrusion detection are available as per
the literature. These approaches are broadly defined by three
ways: i) Signature based approach ii) Anomaly based approach
and iii) Hybrid approach that combines signature and anomaly
detection approaches. The proposed system works for signature
based concept using genetic algorithm as features selection and
detection .The system is tested on KDDCup99 and NSL-KDD
dataset using Weka3.6 classifiers and implemented classifier.

Full Text:

PDF

References


Min Cai, Kai Hwang and Min Qin Hybrid intrusion detection with

weighted signature generation over anomalous internet episodes, IEEE

Transactions on Dependable And Secure Computing, Vol.4 No.1, JanMarch 2007.

Gisung Kim, Seungmin Lee, Sehun Kim A novel hybrid intrusion

detection method integrating anomaly detection with misuse detection,

Expert Systems with Applications, Elsevier Ltd, 2014.

S. Jajodia L., Popyack D. Barbara, J. Couto and N. Wuy. Adam, Detecting Intrusions by data mines, Technical report, Workshop Information

Assurance and Security, USA, 2001.

Bharathi M. Sahana Devi K. J.,Hybrid intrusion detection with weighted

signature generation,Technical report, Dept of CSE, Chickballapur,2011.

Siva S. SivathaSindhu, S. Geetha, A. Kannan” Decision tree based light

weight intrusion detection using a wrapper approach”, Expert Systems

with Applications 39 129-141, 2012

Kapil Kumar Gupta, BaikunthNath, RamamohanaraoKotagiri,” Layered

Approach Using Conditional Random Fields for Intrusion Detection”

IEEE Transactions on Dependable and Secure Computing, Vol.4 No.1,

Jan-March 2010

Dr. Saurabh Mukherjeea, Neelam Sharma,” Intrusion Detection using

Naive Bayes Classifier with Feature Reduction”, Procedia Technology,

128, 2012.

Bertrand Portier, Froment-Curtil,” Data Mining Techniques for Intrusion

Detection”, The University of Texas at Austin, Dr. Ghosh - EE380L Data

Mining Term Paper, Spring 2000.

L PremaRajeswari, KannanArputharaj,” An Active Rule Approach for

Network Intrusion Detection with Enhanced C4.5 Algorithm”, I. J.

Communications, Network and System Sciences, 4, 284-359 Published

Online, November 2008.

Nahla Ben Amor, Salem Benferhat,” Naive Bayes vs Decision Trees

in Intrusion Detection Systems” , SAC04, March 14-17, Nicosia,

Cyprus,2004.

Ahmed H. Fares and Mohamed I. Sharawy,” Intrusion Detection: Supervised Machine Learning”, Journal of Computing Science and Engineering,Vol. 5, No. 4, pp. 305-313, December 2011.

AdetunmbiA.Olusola., AdeolaS.Oladele and Daramola

O.Abosede,”Analysis of KDD 99 Intrusion Detection Dataset for

Selection of Relevance Features”, Proceedings of the World Congress

on Engineering and Computer Science 2010, Vol I WCECS 2010, San

Francisco, USA, October 20-22 2010.

MahbodTavallaee, EbrahimBagheri, Wei Lu and Ali A., Ghorbani,”A

Detailed Analysis of the KDD CUP 99 Data Set, Proceedings of the

IEEE Symposium on Computational Intelligence in Security and

Defense Applications (CISDA 2009).

TaisirEldos, Mohammad KhubebSiddiqui and AwsKanan, The KDD99

Dataset: Statistical Analysis for Feature Selection”,Journal of Data Mining and Knowledge Discovery ISSN: 2229-6662 and ISSN: 2229-6670,

Volume 3, Issue 3, pp.-88-90, 2012.

YisehacYohannes,JohnHoddinott,”Classification and Regression Trees:

An Introductin”,International Food Policy Research Institute,2033 K

Street, N.W.Washington, D.C., U.S.A, 2006

Peyman Kabiri and Ali A. Ghorbani, Research on Intrusion Detection

and Response:A Survey, International Journal of Network Security, Vol.1,

No.2, PP.84102, Sep. 2005.

Wenke Lee and Salvatore J. Stolfo, Data Mining Approaches for

Intrusion Detection, 7th USENIX Security Symposium, 1998.

Ismail Butun, Salvatore D. Morgera, and Ravi Sankar, A Survey of

Intrusion Detection Systems inWireless Sensor Networks, IEEE Communications Surveys and Tutorials, 2013.

WenyingFeng, Quinglei, Gongzhu Hu, Jimmy Xiangi Huang, Mining

Network data for intrusion detection through combining SVMs with ant

colony networks, Future Generation Computer Systems, Elsevier, 2013.

Kapil Kumar Gupta, BaikunthNath, Senior Member, IEEE, and RamamohanaraoKotagiri, Member, IEEE, Layered Approach Using Conditional Random Fields for Intrusion Detection, IEEE Transactions on

Dependable and Secure Computing, Vol. 7, No. 1, January-March 2010.

Prakash Kalavadekar. Dr.Shirish Sane Effective Intrusion Detection Systems using Hybrid ApproachInternational Journal of Exploring EmergingTrends in Engineering, Voume 3 Issue 2 Mar-Apr-2016


Refbacks

  • There are currently no refbacks.


 

Copyright © IJETT, International Journal on Emerging Trends in Technology