A Novel Algorithm for Real Time Intrusion Detection Technique Using Genetic Algorithm  
  Authors : Sheetal Verma; Pravin Malviya

 

Now a day’s growth of local area networks as well as internet gives a more convenient and better business oriented technology for the users. Even though the emerging internet technology is more valuable for the users of the computer systems the critical data security threads are also increasing at a very high rate. Various firms are utilizing different protection technologies to protect their system from the intruder attacks by using antivirus application, firewall, and password protection. There are various techniques and areas which plays really important role in building more secured applications. In this paper we provide one of the most powerful technique i.e evolutionary algorithms (Genetic Algorithm) for Intrusion Detection System. It also gives a brief idea regarding proposed parameters and evolution process genetic algorithm and how to implement it in real time system.

 

Published In : IJCAT Journal Volume 3, Issue 8

Date of Publication : August 2016

Pages : 418-421

Figures :08

Tables : 01

Publication Link :A Novel Algorithm for Real Time Intrusion Detection Technique Using Genetic Algorithm

 

 

 

Sheetal Verma : SBITM, Baitul, India

Pravin Malviya : SBITM, Baitul, India

 

 

 

 

 

 

 

DDOS, Evolutionary Algorithm, GA-RIDS, Genetic Algorthm, Intrusion, IDS, Threats

In this paper we have implemented the rule set for real time system which can detect existing and new intrusions. This system can be very fruitful to integrate with any of the IDS or firewall system to improve the efficiency and the performance. In this paper, the key idea of implemented work is a fitness function of GA which is nothing but the most important factor for system success. In this approach the fitness function is: Fitness = (size * weight) Where the size is the actual packet data size prescribed by the incoming packet data stream and weight is the vector which applied to each chromosome. The above discussed approach of GA processes and evolution operators approach is really helpful to identify DDoS attack and thus provide security to organization data.

 

 

 

 

 

 

 

 

 

[1] T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, H. Javitz, A. Valdes, and T. Garvey. “A real-time intrusion detection expert system (IDES)” - final technical report. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, February 1992. [2] K. Ilgun, R. A. Kemmerer, and P. A. Porras. “State transition analysis: A rulebased intrusion detection approach”. IEEE Transactions on Software Engineering, 21(3):181–199, March 1995 [3] John E. Dickerson, and Julie A. Dickerson “Fuzzy Network Profiling for Intrusion Detection” Electrical and Computer Engineering Department Iowa State University Ames, Iowa, 50011. [4] Rui Zhong, and Guangxue Yue “DDoS Detection System Based on Data Mining” ISBN 978-952-5726- 09-1 (Print) Proceedings of the Second International Symposium on Networking and Network Security (ISNNS ’10)Jinggangshan, P. R. China, 2- 4,April.2010,pp.062-065. [5] Dietrich, S., Long, N., and Dittrich, D. 2000. Analyzing distributed Denial of service attack tools: The shaft case. In Proceedings of 14th Systems Administration Conference. New Orleans, Louisiana, USA, 329-339. [6] Wei Li “Using Genetic Algorithm for network intrusion detection” [7] B.Upalhaiah, K. Anand, B. Narsimha, S. Swaraj, T. Bharat, “Genetic Algorithm Approach to Intrusion Detection System” ISSN: 0976-8491 (online) | ISSN : 2229-4333 (print), IJCST VOL3, ISSUE 1, JANMARCH 2012. [8] Shrinivasa K G, Saumya chandra, Sidharth Kajaria, Shilpita mukharjee, “IGIDS: Intelligent intrusion detection system using Genetic Algorithm”, 978-1- 4673-0126-8/11/2011 IEEE. [9] Anup Goyal, Chetan Kumar, “GA-NIDS : A genetic algorithm based network intrusion detection system”, [10] Atul Kamble, “Incremental Clustering in data mining using genetic algorithm”, IJCTE, Vol 2, No. 3, June, 2010 [11] Shaik Akbar, Dr. J. A. chandulal, Dr. K. Nageswara Rao, G. Sudheer Kumar, “troubleshooting technique for intrusion detection sytem using genetic algorithm”, IJWBC, vol 1(3), december 2011 [12] Suhail Owais, Vaclav Snasel, Pavel Kromer, Ajith abrahim,”Survey: Using genetic algorithm approach in intrusion detection system techniques”, 7th computer information system and industrial management applications,2008 IEEE