Genetic Anomaly Based Ids

International Journal of Computer Science and Engineering
© 2017 by SSRG - IJCSE Journal
Volume 4 Issue 3
Year of Publication : 2017
Authors : M. Jagadheeswari, Dr. M. Anand Kumar

pdf
How to Cite?

M. Jagadheeswari, Dr. M. Anand Kumar, "Genetic Anomaly Based Ids," SSRG International Journal of Computer Science and Engineering , vol. 4,  no. 3, pp. 14-16, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I3P104

Abstract:

The security of network devices will be great issues to provide quality of network. Intrusion detection system have been used many techniques to identify, detect and classify attacks that have been proposed, developed and tested either in offline or online mode. Clustering based detection technique is used to find out the dissimilarity measure to form the k clusters. It represents genetic process specified each chromosome of centroids of the clusters. Two stage fitness function proposed: i) refine the clustering function to introduce the confidence interval ii) calculate and maximize the inter-cluster variance

Keywords:

anomaly based IDS, Genetic algorithm, Clustering.

References:

[1] D. E. Denning, "An intrusion-detection model," Software Engineering, IEEE Transactions on, pp. 222-232, 1987.
[2] C. Kruegel and T. Toth, "A survey on intrusion detection systems," in TU Vienna, Austria, 2000.
[3] J. M. Estevez-Tapiador, P. Garcia-Teodoro, and J. E. Diaz-Verdejo, "Anomaly Detection Methods in Wired Networks: A Survey and Taxonomy," Computer Communications, vol. 27, pp. 1569-1584, 2004.
[4] S. H. Amer and J. Hamilton, "Intrusion Detection Systems (IDS) Taxonomy-A Short Review," Defense Cyber Security, vol. 13, 2010.
[5] A. Lazarevic, L. Ertöz, V. Kumar, A. Ozgur, and J. Srivastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection," in SDM, 2003, pp. 25-36.
[6] V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys (CSUR), vol. 41, p. 15, 2009.
[7] G. Münz, S. Li, and G. Carle, "Traffic anomaly detection using kmeans clustering," in GI/ITG Workshop MMBnet, 2007.
[8] L. Kaufman and P. J. Rousseeuw, Finding groups in data: an introduction to cluster analysis vol. 344. New York: John Wiley & Sons, 1990. [9] D. E. Golberg, "Genetic algorithms in search, optimization, and machine learning," Addion wesley, vol. 1989, 1989.
[10] W. Li, "Using genetic algorithm for network intrusion detection," Proceedings of the United States Department of Energy Cyber Security Group, pp. 1-8, 2004.
[11] P. Gupta and S. K. Shinde, "Genetic algorithm technique used to detect intrusion detection," in Advances in Computing and Information Technology, ed: Springer, 2011, pp. 122-131.
[12] P. G. Majeed and S. Kumar, "Genetic algorithms in intrusion detection systems: A survey," International Journal of Innovation and Applied Studies, vol. 5, pp. 233-240, 2014.
[13] C. Z. Janikow and Z. Michalewicz, "An experimental comparison of binary and floating point representations in genetic algorithms," in ICGA, 1991, pp. 31-36.
[14] C. C. Coello, G. B. Lamont, and D. A. Van Veldhuizen, Evolutionary algorithms for solving multi-objective problems: Springer Science & Business Media, 2007.
[15] S. Sivanandam and S. Deepa, Introduction to genetic algorithms: Springer Science & Business Media, 2008.
[16] Z. Michalewicz, Genetic algorithms+ data structures= evolution programs: Springer Science & Business Media, 1996.
[17] Y. Chen, Y. Li, X.-Q. Cheng, and L. Guo, "Survey and taxonomy of feature selection algorithms detection system," in Information Security and Cryptology, 2006, pp. 153-167.
[18] H.G. Kayacik, A.N. Zincir-Heywood, and M. I. Heywood, "Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets," in Proceedings of the third annual conference on privacy, security and trust, 2005.
[19] A. I. Madbouly, A. M. Gody, and T. M. Barakat, "Relevant Feature Selection Model Using Data Mining for Intrusion Detection System," arXiv preprint arXiv:1403.7726, 2014.