Network intrusion detection system by using genetic algorithm
Developing a better intrusion detection systems (IDS) has attracted many researchers in the area of computer network for the past decades. In this paper, Genetic Algorithm (GA) is proposed as a tool that capable to identify harmful type of connections in a computer network. Different features of con...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Advanced Engineering and Science
2019
|
Subjects: | |
Online Access: | View Fulltext in Publisher View in Scopus |
LEADER | 02034nam a2200229Ia 4500 | ||
---|---|---|---|
001 | 10.11591-ijeecs.v16.i3.pp1593-1599 | ||
008 | 220121s2019 CNT 000 0 und d | ||
020 | |a 25024752 (ISSN) | ||
245 | 1 | 0 | |a Network intrusion detection system by using genetic algorithm |
260 | 0 | |b Institute of Advanced Engineering and Science |c 2019 | |
650 | 0 | 4 | |a Genetic algorithm |
650 | 0 | 4 | |a Intrusion detection |
650 | 0 | 4 | |a Pattern recognition |
856 | |z View Fulltext in Publisher |u https://doi.org/10.11591/ijeecs.v16.i3.pp1593-1599 | ||
856 | |z View in Scopus |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-85073516278&doi=10.11591%2fijeecs.v16.i3.pp1593-1599&partnerID=40&md5=6bac0de315f3be108a5a63ca91061aff | ||
520 | 3 | |a Developing a better intrusion detection systems (IDS) has attracted many researchers in the area of computer network for the past decades. In this paper, Genetic Algorithm (GA) is proposed as a tool that capable to identify harmful type of connections in a computer network. Different features of connection data such as duration and types of connection in network were analyzed to generate a set of classification rule. For this project, standard benchmark dataset known as KDD Cup 99 was investigated and utilized to study the effectiveness of the proposed method on this problem domain. The rules comprise of eight variables that were simulated during the training process to detect any malicious connection that can lead to a network intrusion. With good performance in detecting bad connections, this method can be applied in intrusion detection system to identify attack thus improving the security features of a computer network. Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. | |
700 | 1 | 0 | |a Harun, A.F. |e author |
700 | 1 | 0 | |a Mohamad, R. |e author |
700 | 1 | 0 | |a Musirin, I. |e author |
700 | 1 | 0 | |a Suhaimi, H. |e author |
700 | 1 | 0 | |a Suliman, S.I. |e author |
773 | |t Indonesian Journal of Electrical Engineering and Computer Science |x 25024752 (ISSN) |g 16 3, 1593-1599 |