Neurofuzzy and Genetic Network Programming Based Intrusion Detection System


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


In today’s environment security is the big problem for all kinds of networks. Many methods have been developed to secure the network communication, among them Intrusion Detection System (IDS) is an essential component .The traditional approaches for intrusion detection are currently being used but unable to manage various newly arising attacks and high false alarm rates. Due to the variety of network behaviour and fast development of new attack, it is necessary to develop efficient IDS model to detect all kinds of new attacks. This paper proposes a Network Intrusion Detection model uses the learning algorithm which combines ANN and fuzzy logic and evolutionary optimization technique called Genetic Network Programming (GNP). The proposed model is evaluated using KDDCup99 Dataset which shows higher detection rate as well as low false alarm rate
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Intrusion Detection; Fuzzy Logic; Artificial Neural Network; Genetic Network Programming

Full Text:

PDF


References


Teresa F. Lunt: ―Ides: an intelligent system for detecting intruders.Computer security, threat and countermeasures 30-45 (1990).

Dorothy E. Denning: ―An intrusion-detection model.In: IEEE Trans Software VOL. SE-13 NO. 2, 118–13 (1986).

Bo Sun and Lawrence Osborne: Intrusion detection techniques in mobile ad hoc and wireless sensor network.. In: IEEE Wireless Communications, 1536-1284 (2007).

H.Debar, M.Dacier, A.Wespi, “Towards a taxonomy of intrusion-detection systems”, Computer Networks 31 (8) (1999) 805-822

Jang, J. S. R. and C. T. Sun, "Neuro-fuzzy modeling and control,” Proceedings of the IEEE, March. pp. 378-406, March 1995.

Abade M. S, Habibi J., Lucas C., "Intrusion detection using a fuzzy genetics-based learning algorithm", Journal of Network and Computer Applications, August 2005.

Lin, C.T. and C.S. G. Lee, "Neuro Fuzzy Systems", Prentice Hall (1996).

Kasabov, N. Foundations of Neural Networks, Fuzzy Systems and Knowledge Engineering, The MIT Press, CA, MA (1996).

D. E. Goldberg, Genetic Algorithm in Search, Optimization and Machine Learning. Reading, MA: Addison-Wesley, 1989.

J. R. Koza, Genetic Programming, on the Programming of Computers by Means of Natural Selection. Cambridge, MA: MIT Press, 1992.

W. Lu and I. Traore, “Detecting new forms of network intrusion using genetic programming,” Comput. Intell., vol. 20, no. 3, pp. 474–494, 2004.

S. Mabu, K. Hirasawa, and J. Hu, “A graph-based evolutionary algoritm: Genetic network programming (GNP) and its extension using reinforcement learning,” Evol. Comput., vol. 15, no. 3, pp. 369–398, 2007.

Wang Yunwu “Using Fuzzy Expert System Based on Genetic Algorithms for Intrusion Detection System” Information Technology and Applications, IFITA , International Forum Vol 2, 2009.

Norbik Bashah Idris, Bharanidharan Shanmugam “Novel Attack Detection Using Fuzzy Logic and Data Mining”, International Conference of Soft Computing and Pattern Recognition, SOCPAR '2009.

Ajith Abraham, Ravi Jain, Johnson Thomas, Sang Yong Han, “Distributed soft computing intrusion detection system”, Journal of Network and Computer Applications,2007

W. Li, “Using Genetic Algorithm for Network Intrusion Detection”. “A Genetic Algorithm Approach to Network Intrusion Detection”. SANS Institute, USA, 2004.

J. Shum and A. Heidar Malki, "Network Intrusion Detection System Using Neural Networks", Fourth International Conference on Natural Computation, IEEE computer society.2008.

D. Novikov, V. Roman Yampolskiy, and L. Reznik, "Anomaly Detection Based Intrusion Detection", IEEE computer society.2006. No.4, pp.523-531.2007.

S. Mukkamala, H. Andrew Sung, and A. Abraham, "Intrusion detection using an ensemble of intelligent paradigms", Journal of Network and Computer Applications 28. pp167–182.2005.

S. Jimmy and A. Heidar, "Network Intrusion Detection System using Neural Networks", IEEE computer society.2008.

M. Vallipuram and B. Robert, "An Intelligent Intrusion Detection System based on Neural Network", IADIS International Conference Applied Computing.2004.

A. Abraham, R. Jain, Soft computing models for network intrusion detection systems, Studies in Computational Intelligence 16 (2005) 191–211, doi:10.1007/b98152.

M.S. Abadeh, J. Habibi, C. Lucas, Intrusion detection using a fuzzy genetics-based learning algorithm, Journal of Network and Computer Applications (2005), doi:10.1016/j.jnca.2005.05.002.

J. Gomez, D. Dasgupta, Evolving fuzzy classifiers for intrusion detection, in: Proceeding of 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, USA,2001, pp. 68–75.

Yin, G., Intrusion detection technology based on multiple classifiers, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 729-732.

Weihua, H., Qi, J., Yuge, D., Li, C., Zhao, W., Li, C., Anides: Agent-based network intrusion detection expert system, (2012) International Review on Computers and Software (IRECOS), 7 (4), pp. 1453-1457.

Sengan, S., Chethur Pandian, S., An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3037-3041.

Thinh, T.N., Vu, T.H., Tomiyama, S., High performance TCP reassembly for network intrusion detection system, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3320-3325.

Chen, R., Zhou, J., Liu, C., Zhang, Y., A novel detection model for network attack inspired by immunology, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2927-2932.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize