Loading [MathJax]/extensions/MathMenu.js
Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques | IEEE Conference Publication | IEEE Xplore

Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques


Abstract:

The wide spread use of computer networks in today's society, especially the sudden surge in importance of the World Wide Web, has made computer network security an intern...Show More

Abstract:

The wide spread use of computer networks in today's society, especially the sudden surge in importance of the World Wide Web, has made computer network security an international priority. Since it is not technically feasible to build a system with no vulnerabilities, intrusion detection (ID) has become an important area for researches. An intrusion that deviates only slightly from a pattern derived from the audit data may not be detected or a small change in normal behavior may cause a wrong data. Intrusion detection systems (IDS) offer techniques for modeling and recognizing normal and abusive system behavior. GAs can be successfully used to tune the membership functions used by the IDS. In this paper a survey were performed approaches based on IDS, and on implementing of GAs (GAs) on IDS.
Date of Conference: 26-28 June 2008
Date Added to IEEE Xplore: 09 July 2008
Print ISBN:978-0-7695-3184-7
Conference Location: Ostrava, Czech Republic
References is not available for this document.

1. Introduction

Computers are systems that store, process, and retrieve data. Data is invaluable resource for every company or enterprise. The most important requirements for handling data are availability, integrity and confidentiality. While your home computer was isolated and not connected with any other computer(s) and doesn't have modem. Then the only way that any one can attacks your computer's information is by physically coming to the computer and uses it. Your computer will be vulnerabilities by entering your computer room, so securing the room it does will secure the data.

Select All
1.
S. Kumar, and E. H. Spafford, "An Application of Pattern Matching in Intrusion. Detection", Technical Report CSD-TR-94-013, 1994.
2.
A. Sundaram, "An Introduction to Intrusion Detection", Computer Security. Issue 2.4. 1996.
3.
Aleksandar L., Vipin K., and Jaideep S., Massive Computing Managing Cyber Threats, Issues, Approaches, and Challenges. Chapter 2. Intrusion Detection: A Survey. Computers/General Information. Springer. 2005.
4.
S. S. J. Owais, P. Krömer, and V. Snášel, Implementing GP on Optimizing Boolean and Extended Boolean Queries in IRs with Respect to Users Profiles", ICCES06, IEEE. ISBN: 14244-0272-7, Egypt, 2006, pp. 412-417.
5.
S. Owais, "Optimization, of Boolean. Queries in Information Retrieval Systems Using GAs - Genetic Programming and Fuzzy Logic", CSIT 2006, Vol. 2. Jordan, 2006, pp. 303-314.
6.
A. K. Jones, and R. S. Sielken, "Computer System. Intrusion Detection: A Survey", Technical Report, Computer Science Dept., University of Virginia, 2000.
7.
R. Bace, and P. Meli, "Intrusion Detection Systems", National Institute of Standards and. Technology NIST, 2001. [8]. S. Axelsson, "Intrusion Detection Systems: A Survey and Taxonomy", Technical Report 99-15, Department of Computer Engineering, Chalmers University, 2000.
8.
S. Kumar, "Classification and Detection of Computer Intrusions", Ph.D. Thesis, Purdue University, 1995.
9.
R. H. Gong, M. Zulkernine, and Purang, "A software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection", SNPD/SAWN05, IEEE, 2005.
10.
S. Kumar, and E. H. Spafford, " A Software Architecture to support Misuse Intrusion Detection", Technical Report CSD-TR-95-009, 1995.
11.
K. Scarfone, and P. Mell, "Guide to Intusion Detection and Prevention Systems", National Institute of Standards and Technology NIST. Computer Security, 2007.
12.
S. Owais, P. Krömer, and V. Snašel, "Query Optimization by Genetic Algorithms", DATESO, ISBN: 80-01-03204-3, 2005, pp. 125-137.
13.
W. Li, "Using Genetic Algorithm, for Network. Intrusion Detection", Proceedings of the United States Department of Energy Cyber Security Group, 2004.
14.
A. A. R, Townsend. "GAs - a Tutorial", 2003.
15.
P. A. Diaz-Gomez, and D. F. Hougen, "Three Approaches to Intrusion Detection Analysis and Enhancements", VI National Computer and Information Security Conference ACIS, Colombia, 2006.
16.
J. L. Zhao, J. F. Zhao, and J. J. Li, "Intrusion Detection Based on Clustering Genetic Algorithm", International Conference on Machine Learning and Cybernetics IEEE, Guangzhou, 2005, pp. 3911-3914.
17.
W. Spears, and V. Anand, "A Study of Crossover Operators in Genetic Programming", In Proceedings of the Sixth International Symposium, on Methodologies for Intelligent Systems, Charlotte, NC. 1991, pp. 409-418.
18.
A. Chittur, "Model Generation for an. Intrusion Detection System Using Genetic Algorithms", Ossining High School, Ossining NY, 2001.
19.
Sinclair, Chris, L. Pierce, and S. Matzner, "An Application of Machine Learning to Network Intrusion Detection", Annual Computer Security Applications Conference, 1999, pp. 371-377.
20.
Koza J., "Genetic Programming: On the Programming of Computers by Means of Natural Selection", The MIT Press, 1992.
21.
Y. Chen, A. Abraham, B. Yang., "Hybrid Flexible Neural-Tree-Based Intrusion Detection. Systems" International Journal of Intelligent Systems, vol. 22, 337-352, 2007
22.
A. Abraham and C. Grosan: "Evolving Intrusion Detection Systems", Studies in Computational Intelligence (SCI) 13, 57-79 (2006)
23.
A. Abraham, "Evolutionary Computation in Intelligent Network. Management", in Evolutionary Computing in. Data Mining, Springer, pp. 189-210, 2004
24.
A.T.Haghighat, M.Esmaeili, A.Saremi, V.R.Mousavi, "Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary Algorithms", in ICIS 2007, IEEE, 2007
25.
Dong Seong Kim, Ha-Nam Nguyen, Jong Sou Park, "Genetic Algorithm to Improve SVM Based Network Intrusion Detection System", AINA05, IEEE, 2005

Contact IEEE to Subscribe

References

References is not available for this document.