Open Access
Subscription Access
Open Access
Subscription Access
Challenges in Genetic Algorithm Based Intrusion Detection
Subscribe/Renew Journal
Intrusion detection is the technique of detecting malicious traffic on a network or a device. It is one of the critical network security components against emerging intrusions techniques and attacks. In this paper we present a survey of different intrusion detection approaches. Intrusion Detection Systems based on Genetic Algorithm are currently attracting researchers due to its inherent potential. Intrusion detection faces various challenges like reliably detect malicious activity and perform efficiently to cope with the large amount of network traffic. Here we have analyzed the present research challenges and issues in Genetic Algorithm based intrusion detection. Finally we carry out our experiments based on our sample Genetic Algorithm using KDD Cup 99 data set. The main contribution of the implementation is the understanding of challenges in Genetic Algorithm based intrusion detection.
Keywords
Security, Challenges, Genetic Algorithm, Intrusion Detection
Subscription
Login to verify subscription
User
Font Size
Information
- Sumit A. Khandelwal, Shoba. A. Ade, Amol A. Bhosle and Radha S. Shirbhate, "A Simplified Approach to Identify Intrusion in Network with Anti Attacking Using .net Tool", International Journal of Computer and Electrical Engineering, Vol. 3, No. 3, June 2011
- Z. Muda, W. Yassin, M. N. Sulaiman, and N. I. Udzir, "A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection", Information Technology Journal 10(3): 648-655, 2011
- 3Fatin Norsyafawati Mohd Sabri, Norita Md.Norwawi, and Kamaruzzaman Seman, "Identifying False Alarm Rates for Intrusion Detection System with Data Mining", IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.4, April 2011
- Ghanshyam Prasad Dubey, Prof. Neetesh Gupta, Rakesh K Bhujade, "A Novel Approach to Intrusion Detection System using Rough Set Theory and Incremental SVM", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231- 2307, Volume-1, Issue-1, March 2011
- Ritu Ranjani Singh, Neetesh Gupta, Shiv Kumar, "To Reduce the False Alarm in Intrusion Detection System using self Organizing Map", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-2, May 2011
- P.Rajapandian, Dr.K.Alagarsamy, "Intrusion Detection in Dos Attacks", International Journal of Computer Applications (0975 – 8887) Volume 15– No.8, February 2011
- Shailendra Kumar Shrivastava, Preeti Jain, "Effective Anomaly based Intrusion Detection using Rough Set Theory and Support Vector Machine", International Journal of Computer Applications (0975 – 8887) Volume 18– No.3, March 2011
- S. Selvakani Kandeeban, R. S. Rajesh, "A Mutual Construction for IDS Using GA", International Journal of Advanced Science and Technology Vol. 29, April, 2011
- Kunjal Mankad, Priti Srinivas Sajja, and Rajendra Akerkar, "EVOLVING RULES USING GENETIC FUZZY APPROACH - AN EDUCATIONAL CASE STUDY", International Journal on Soft Computing ( IJSC ), Vol.2, No.1, February 2011
- VEGARD ENGEN, "MACHINE LEARNING FOR NETWORK BASED INTRUSION DETECTION", PhD thesis, Bournemouth University, June 2010
- R. Shanmugavadivu, Dr.N.Nagarajan, "NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC", Indian Journal of Computer Science and Engineering (IJCSE)
- S.Sethuramalingam, Dr.E.R. Naganathan, "HYBRID FEATRUE SELECTION FOR NETWORK INTRUSION", International Journal on Computer Science and Engineering (IJCSE)
- Ahmed AHMIM, Nacira GHOUALMI, Noujoud KAHYA, "Improved Off-Line Intrusion Detection Using A Genetic Algorithm And RMI", (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No.1, January 2011
- M. Sadiq Ali Khan, "Rule based Network Intrusion Detection using Genetic Algorithm", International Journal of Computer Applications (0975 – 8887) Volume 18– No.8, March 2011
- Ian Stewart, "A Modified Genetic Algorithm and Switch-Based Neural Network Model Applied to Misuse-Based Intrusion Detection", Master of Science Thesis, Queen's University, Kingston, Ontario, Canada, February 2009
- Zorana Bankovic,"A Genetic Algorithm-based Solution for Intrusion Detection", Journal of Information Assurance and Security, (2009) 192-199
- Ian Stewart, "A Modified Genetic Algorithm and Switch-Based Neural Network Model Applied to Misuse-Based Intrusion Detection", MS Thesis, Queen's University, Kingston, Ontario, Canada, February 2009
- S. SELVAKANI and R.S.RAJESH, "Escalate Intrusion Detection using GA - NN", Int. J. Open Problems Compt. Math., Vol. 2, No. 2, June 2009
- Zorana Bankovic, José M. Moya, Álvaro Araujo, Slobodan Bojanic and Octavio Nieto-Taladriz, "A Genetic Algorithm-based Solution for Intrusion Detection", Journal of Information Assurance and Security 4 (2009) 192-199
- H. Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood, "Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets", the NIMS Laboratory, http://www.cs.dal.ca/projectx, 2006
- Russell Meyer, “Challenges of Managing an Intrusion Detection System (IDS) in the Enterprise”, As part of Information Security Reading Room, SANS Institute, http://www.sans.org, June 2011
- Valerie Vogel, "Network and Host Security Implementation". Retrieved June 2011 from https://wiki.internet2.edu/confluence/display/secguide/Network+and+Host +Security+Implementation+(Stage+1)
Abstract Views: 426
PDF Views: 2