Now a day’s growth of local area networks as
well as internet gives a more convenient and better business
oriented technology for the users. Even though the emerging
internet technology is more valuable for the users of the
computer systems the critical data security threads are also
increasing at a very high rate. Various firms are utilizing
different protection technologies to protect their system
from the intruder attacks by using antivirus application,
firewall, and password protection. There are various
techniques and areas which plays really important role in
building more secured applications. In this paper we
provide one of the most powerful technique i.e evolutionary
algorithms (Genetic Algorithm) for Intrusion Detection
System. It also gives a brief idea regarding proposed
parameters and evolution process genetic algorithm and how
to implement it in real time system.
In this paper we have implemented the rule set for real
time system which can detect existing and new intrusions.
This system can be very fruitful to integrate with any of
the IDS or firewall system to improve the efficiency and
the performance. In this paper, the key idea of
implemented work is a fitness function of GA which is
nothing but the most important factor for system success.
In this approach the fitness function is: Fitness = (size *
weight) Where the size is the actual packet data size
prescribed by the incoming packet data stream and weight is the vector which applied to each chromosome. The
above discussed approach of GA processes and evolution
operators approach is really helpful to identify DDoS
attack and thus provide security to organization data.
[1] T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P.
Neumann, H. Javitz, A. Valdes, and T. Garvey. “A
real-time intrusion detection expert system (IDES)” -
final technical report. Technical report, Computer
Science Laboratory, SRI International, Menlo Park,
California, February 1992.
[2] K. Ilgun, R. A. Kemmerer, and P. A. Porras. “State
transition analysis: A rulebased intrusion detection
approach”. IEEE Transactions on Software
Engineering, 21(3):181–199, March 1995
[3] John E. Dickerson, and Julie A. Dickerson “Fuzzy
Network Profiling for Intrusion Detection” Electrical
and Computer Engineering Department Iowa State
University Ames, Iowa, 50011.
[4] Rui Zhong, and Guangxue Yue “DDoS Detection
System Based on Data Mining” ISBN 978-952-5726-
09-1 (Print) Proceedings of the Second International
Symposium on Networking and Network Security
(ISNNS ’10)Jinggangshan, P. R. China, 2-
4,April.2010,pp.062-065.
[5] Dietrich, S., Long, N., and Dittrich, D. 2000.
Analyzing distributed Denial of service attack tools:
The shaft case. In Proceedings of 14th Systems
Administration Conference. New Orleans, Louisiana,
USA, 329-339.
[6] Wei Li “Using Genetic Algorithm for network
intrusion detection”
[7] B.Upalhaiah, K. Anand, B. Narsimha, S. Swaraj, T.
Bharat, “Genetic Algorithm Approach to Intrusion
Detection System” ISSN: 0976-8491 (online) | ISSN :
2229-4333 (print), IJCST VOL3, ISSUE 1, JANMARCH
2012.
[8] Shrinivasa K G, Saumya chandra, Sidharth Kajaria,
Shilpita mukharjee, “IGIDS: Intelligent intrusion
detection system using Genetic Algorithm”, 978-1-
4673-0126-8/11/2011 IEEE.
[9] Anup Goyal, Chetan Kumar, “GA-NIDS : A genetic
algorithm based network intrusion detection system”,
[10] Atul Kamble, “Incremental Clustering in data mining
using genetic algorithm”, IJCTE, Vol 2, No. 3, June,
2010
[11] Shaik Akbar, Dr. J. A. chandulal, Dr. K. Nageswara
Rao, G. Sudheer Kumar, “troubleshooting technique
for intrusion detection sytem using genetic algorithm”,
IJWBC, vol 1(3), december 2011
[12] Suhail Owais, Vaclav Snasel, Pavel Kromer, Ajith
abrahim,”Survey: Using genetic algorithm approach in
intrusion detection system techniques”, 7th computer
information system and industrial management
applications,2008 IEEE