Integrated Intrusion Detection System Using Soft Computing

Intrusion Detection systems are increasingly a key part of system defense. Various approaches to Intrusion Detection are currently being used but they are relatively inefiective. Among the several soft computing paradigms, we investigated genetic algorithms and neural networks to model fast and e‐cient Intrusion Detection Systems. With the feature selection process proposed it is possible to reduce the number of input features signiflcantly which is very important due to the fact that the Radial Basis Function networks can efiectively be prevented from over fltting. The Genetic algorithm employs only the eight most relevant features for each attack category for rule generation. The generated rules signal an attack as well as its category and it is end for training to RBF network. The optimal subset of features combined with the generated rules, can be used to analyze the attacks. Empirical results clearly show that soft computing approach could play a major role for intrusion detection. The model was verifled on KDD99 demonstrating higher detection rates than those reported by the state of art while maintaining low false positive rate.

[1]  M. R. Spiegel E and M , 1981 .

[2]  Ali A. Ghorbani,et al.  A Feature Classification Scheme For Network Intrusion Detection , 2007, Int. J. Netw. Secur..

[3]  Hong Shen,et al.  An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection , 2007, Int. J. Netw. Secur..

[4]  Bernhard Sick,et al.  Evolutionary optimization of radial basis function networks for intrusion detection , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[5]  Ren Hui Gong,et al.  A software implementation of a genetic algorithm based approach to network intrusion detection , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.

[6]  Chittur,et al.  Model Generation for an Intrusion Detection System Using Genetic Algorithms , 2001 .

[7]  O. Nasraoui,et al.  Complete expression trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection , 2002, 2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622).

[8]  Christin Schäfer,et al.  Learning Intrusion Detection: Supervised or Unsupervised? , 2005, ICIAP.

[9]  V. Vaidehi,et al.  Performance Analysis of Soft Computing Based Anomaly Detectors , 2008, Int. J. Netw. Secur..

[10]  Fabio A. González,et al.  An Evolutionary Approach to Generate Fuzzy Anomaly Signatures , 2003, IAW.

[11]  Ali A. Ghorbani,et al.  Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..

[12]  Ge Yu,et al.  Method of evolutionary neural network-based intrusion detection , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).

[13]  Tarun Bhaskar,et al.  A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability , 2008, Int. J. Netw. Secur..

[14]  V. Rao Vemuri,et al.  Use of K-Nearest Neighbor classifier for intrusion detection , 2002, Comput. Secur..

[15]  S. Selvakani Kandeeban,et al.  Improving ID performance using GA and NN , 2008, Int. J. Comput. Aided Eng. Technol..