Intelligent Intrusion Detection System Using Genetic Algorithm

Authors

  • S. Kannan Kings College of Engineering,Thanjavur, Tamilnadu, India
  • A.Albert Martin Ruban Kings College of Engineering,Thanjavur, Tamilnadu, India
  • M. Arun Kings College of Engineering,Thanjavur, Tamilnadu, India

DOI:

https://doi.org/10.24297/jac.v12i17.1489

Keywords:

Intrusion Detection System, Genetic algorithm.

Abstract

Intrusion detection is an essential and important technique in research field. One of the main challengesin the security system of large-scale high-speed networks is the detection of suspicious anomalies in network traffic patterns due to different kinds of network attack. We give attacks normally identified by intrusion detection systems. Differentiation can be done in existing intrusion detection methods and systems based on the underlying computational methods used. Intrusion detection methods started appearing in the last few years. In this paper we propose an Intrusion detection method using Genetic Algorithm (GA). In this research contribution of each of above mentioned techniques will be systematically summarized and compared that will allows us to clearly define existing research challenges, and to highlight promising new research directions.

Downloads

Download data is not yet available.

Author Biographies

S. Kannan, Kings College of Engineering,Thanjavur, Tamilnadu, India

Department of Information Technology,

A.Albert Martin Ruban, Kings College of Engineering,Thanjavur, Tamilnadu, India

Department of EEE,

M. Arun, Kings College of Engineering,Thanjavur, Tamilnadu, India

Department of CSE,

References

1. Mouna Jouini , Latifa Ben Arfa Rabai , & Anis Ben Aissa (2014) “Classification of Security Threats in
Information Systems” The 5th International Conference on Ambient Systems, Networks and Technologies
(ANT-2014).
2. William Stallings (2011) “Cryptography and Network Security” 6th edition. Prentice Hall
3. J.P. Anderson(1980), “Computer security threat Monitoring and surveillance” Technical Report, James
P. Anderson Co, Fort Washington, PA
4. P. Barford and D. Plonka (2001), “Characteristics of network traffic flow anomalies”, Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement,ACM New York, NY, USA, 2001, pp. 69–73.
5. A. Ghosh, A. Schwartzbard, M. Shatz (1999) Learning Program Behavior Profiles for Intrusion Detection, Proc.1st USENIX Workshop on Intrusion Detection and Network Monitoring.
6. P.E. Proctor(2001) The Practical Intrusion Detection Handbook (Prentice-Hall, Englewood Cliffs ) pp. 108–111
7. S. Axelsson, Intrusion detection systems (2000)“A survey and taxonomy”, Tech. Report 99-15, Chalmers University of Technology, Department of Computer Engineering.
8. Gulshan Kumar, Krishan Kumar & Monika Sachdeva (2010) “The use of artificial intelligence based techniques for intrusion detection: a review” Published online: 4 September 2010 © Springer Science+Business Media
9. Panda, Mrutyunjaya, Ajith Abraham, and Manas Ranjan Patra (2012) “A Hybrid Intelligent Approach for Network Intrusion Detection,” Procedia Engineering 30 (2012), 1-9
10. F. Aminzadeh and M. Jamshidi (1994) “Soft Computing”. Prentice Hall.
11. Wang G, Hao J, Ma J Huang L. (2010) “A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering” Expert Systems with Applications 37 (2010) 6225–6232.
12. Christopher M. Bishop (1995) “Neural Networks for Pattern Recognition”, Oxford presses 1995.
13. Cihan H. Dagli & Pipatpong Poshyanonda (1994), “Basic artificial neural network architectures” Artificial Neural Networks for Intelligent Manufacturing (39-65) Springer Netherlands.
14. Bhavin S. and Bhushan H. T. (2012), “Artificial Neural Network based Intrusion Detection System: A Survey”, International Journal of Computer Applications 39(6):13-18.
15. J.P. Anderson(1980), “Computer security threat monitoring and surveillance” Technical Report, James P. Anderson Co, Fort Washington, PA
16. Dorothy E. Denning, D. L. Edwards, R. Jagannathan, T. F. Lunt, and P. G. Neumann (1987) A Prototype IDES— A Real-Time Intrusion Detection Expert System. Technical report, Computer Science Laboratory, SRI International.
17. Fox, K. L., Henning, R. R., Reed, J. H., and Simonian, R. (1990). A neural network approach towards intrusion detection. In Proceedings of the 13th National Computer Security Conference, 125-134.
18. A. Chittur, “Model Generation for an Intrusion Detection System Using Genetic Algorithms,” High School Honors Thesis, Ossining High School, Ossining, NY, 2001.
19. W. Li, (2004) “Using Genetic Algorithm for Network Intrusion Detection”. “A Genetic Algorithm Approach to Network Intrusion Detection”. SANS Institute, USA.
20. Tao Xia, Guangzhi Qu, Salim Hariri & Mazin Yousif (2005), “An efficient Network Detection Method Based on Information Theory and Genetic Algorithm”, Proceedings of the 24th IEEE International Performance Computing and Communications Conference, Phoenix, Arizona, USA, 2005
21. B. Abdullah, I. Abd-alghafar, Gouda I. Salama, A. Abd-alhafez, “Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System”, 2009.
22. W. Lu & I. Traore (2004), “Detecting New Forms of Network Intrusion Using Genetic Programming”. Computational Intelligence, vol. 20, pp. 3, Blackwell Publishing, Malden, pp. 475-494, 2004.
23. R. H. Gong, M. Zulkernine, P. Abolmaesumi (2005), “A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection”, 2005


24. B.Upalhaiah, K. Anand, B. Narsimha, S. Swaraj, T. Bharat, “Genetic Algorithm Approach to Intrusion Detection System” ISSN: 0976-8491 (online) | ISSN : 2229-4333 (print), IJCST VOL3, ISSUE 1, JAN-MARCH 2012.
25. Shrinivasa K G, Saumya chandra, Sidharth Kajaria, Shilpita mukharjee, “IGIDS: Intelligent intrusion detection system using Genetic Algorithm”, 978-1-4673-0126-8/11/2011 IEEE.
26. Anup Goyal, Chetan Kumar, “GA-NIDS : A genetic algorithm based network intrusion detection system”,
27. Atul Kamble, “Incremental Clustering in data mining using genetic algorithm”, IJCTE, Vol 2, No. 3, June, 2010
28. Shaik Akbar, Dr. J. A. chandulal, Dr. K. Nageswara Rao, G. Sudheer Kumar, “troubleshooting technique for intrusion detection sytem using genetic algorithm”, IJWBC, vol 1(3), december 2011
29. Melanie Mitchell (1998), “An Introduction to Genetic Algorithms “
30. Suhail Owais, Vaclav Snasel, Pavel Kromer, Ajith abrahim,”Survey: Using genetic algorithm approach in intrusion detection system techniques”, 7th computer information system and industrial management applications,2008 IEEE
31. Scott M(2004) “An introduction to genetic algorithms” Journal of Computing Sciences in Colleges Volume 20 Issue 1, October 2004 Pages 115-123.
32. V. Moraveji Hashmei, Z. Muda and W. Yassin, “Improving Intrusion Detection using Genetic Algorithm”, International Technology journal 12(11) pp. 2167-2173, 2013.

Downloads

Published

2016-09-01

How to Cite

Kannan, S., Ruban, A. M., & Arun, M. (2016). Intelligent Intrusion Detection System Using Genetic Algorithm. JOURNAL OF ADVANCES IN CHEMISTRY, 12(17), 5020–5025. https://doi.org/10.24297/jac.v12i17.1489

Issue

Section

Articles