Network intrusion detection system by using genetic algorithm

Developing a better intrusion detection systems (IDS) has attracted many researchers in the area of computer network for the past decades. In this paper, Genetic Algorithm (GA) is proposed as a tool that capable to identify harmful type of connections in a computer network. Different features of con...

Full description

Bibliographic Details
Main Authors: Harun, A.F (Author), Mohamad, R. (Author), Musirin, I. (Author), Suhaimi, H. (Author), Suliman, S.I (Author)
Format: Article
Language:English
Published: Institute of Advanced Engineering and Science 2019
Subjects:
Online Access:View Fulltext in Publisher
View in Scopus
LEADER 02034nam a2200229Ia 4500
001 10.11591-ijeecs.v16.i3.pp1593-1599
008 220121s2019 CNT 000 0 und d
020 |a 25024752 (ISSN) 
245 1 0 |a Network intrusion detection system by using genetic algorithm 
260 0 |b Institute of Advanced Engineering and Science  |c 2019 
650 0 4 |a Genetic algorithm 
650 0 4 |a Intrusion detection 
650 0 4 |a Pattern recognition 
856 |z View Fulltext in Publisher  |u https://doi.org/10.11591/ijeecs.v16.i3.pp1593-1599 
856 |z View in Scopus  |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-85073516278&doi=10.11591%2fijeecs.v16.i3.pp1593-1599&partnerID=40&md5=6bac0de315f3be108a5a63ca91061aff 
520 3 |a Developing a better intrusion detection systems (IDS) has attracted many researchers in the area of computer network for the past decades. In this paper, Genetic Algorithm (GA) is proposed as a tool that capable to identify harmful type of connections in a computer network. Different features of connection data such as duration and types of connection in network were analyzed to generate a set of classification rule. For this project, standard benchmark dataset known as KDD Cup 99 was investigated and utilized to study the effectiveness of the proposed method on this problem domain. The rules comprise of eight variables that were simulated during the training process to detect any malicious connection that can lead to a network intrusion. With good performance in detecting bad connections, this method can be applied in intrusion detection system to identify attack thus improving the security features of a computer network. Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. 
700 1 0 |a Harun, A.F.  |e author  
700 1 0 |a Mohamad, R.  |e author  
700 1 0 |a Musirin, I.  |e author  
700 1 0 |a Suhaimi, H.  |e author  
700 1 0 |a Suliman, S.I.  |e author  
773 |t Indonesian Journal of Electrical Engineering and Computer Science  |x 25024752 (ISSN)  |g 16 3, 1593-1599