Vector Based Genetic Algorithm to optimize predictive analysis in network security

A new Intrusion Detection System (IDS) for network security is proposed making use of a Vector-Based Genetic Algorithm (VBGA) inspired by evolutionary approaches. The novelty in the algorithm is to represent chromosomes as vectors and training data as matrices. This approach allows multiple pathways to calculate fitness function out of which one particular methodology is used and tested. The proposed method uses the overlap of the matrices with vector chromosomes for model building. The fitness of the chromosomes is calculated from the comparison of true and false positives in test data. The algorithm is flexible to train the chromosomes for one particular attack type or to detect the maximum number of attacks. The VBGA has been tested on two datasets (KDD Cup-99 and CTU-13). The proposed algorithm gives high detection rate and low false positives as compared to traditional Genetic Algorithm. A detailed comparative analysis is given of proposed VBGA with the traditional string-based genetic algorithm on the basis of accuracy and false positive rates. The results show that vector based genetic algorithm provides a significant improvement in detection rates keeping false positives at minimum.

[1]  Emma Ireland,et al.  Intrusion Detection with Genetic Algorithms and Fuzzy Logic , 2013 .

[2]  N. Wattanapongsakorn,et al.  Real-time intrusion detection with fuzzy genetic algorithm , 2013, 2013 10th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.

[3]  Václav Snásel,et al.  Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[4]  Aboul Ella Hassanien,et al.  Genetic algorithm with different feature selection techniques for anomaly detectors generation , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[5]  Dong Seong Kim,et al.  Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System , 2005, ISNN.

[6]  Julie Greensmith,et al.  Sensing Danger: Innate Immunology for Intrusion Detection , 2007, Inf. Secur. Tech. Rep..

[7]  Hari Om,et al.  A hybrid system for reducing the false alarm rate of anomaly intrusion detection system , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).

[8]  Amin Dastanpour,et al.  Using Genetic Algorithm to Supporting Artificial Neural Network for Intrusion Detection System , 2014 .

[9]  Philip K. Chan,et al.  Machine Learning for Computer Security , 2006, J. Mach. Learn. Res..

[10]  K. G. Srinivasa,et al.  Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems , 2012 .

[11]  Sam Kwong,et al.  Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection , 2007, Pattern Recognition.

[12]  F. Azuaje Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[13]  Roshani Gaidhane,et al.  Survey: Learning Techniques for Intrusion Detection System (IDS) , 2014 .

[14]  Darrell Whitley,et al.  A genetic algorithm tutorial , 1994, Statistics and Computing.

[15]  Ahmed Patel,et al.  A survey of intrusion detection and prevention systems , 2010, Inf. Manag. Comput. Secur..

[16]  Octavio Nieto-Taladriz,et al.  Improving network security using genetic algorithm approach , 2007, Comput. Electr. Eng..

[17]  Kien A. Hua,et al.  Decision tree classifier for network intrusion detection with GA-based feature selection , 2005, ACM Southeast Regional Conference.

[18]  Ali A. Ghorbani,et al.  Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection , 2007, Fifth Annual Conference on Communication Networks and Services Research (CNSR '07).

[19]  Samidha Dwivedi Sharma,et al.  Improved Algorithm for Intrusion Detection Using Genetic Algorithm and SNORT , 2014 .

[20]  John Gantz,et al.  The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East , 2012 .

[21]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[22]  Nasser Yazdani,et al.  Mutual information-based feature selection for intrusion detection systems , 2011, J. Netw. Comput. Appl..

[23]  Salvatore J. Stolfo,et al.  Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[24]  Lawrence. Davis,et al.  Handbook Of Genetic Algorithms , 1990 .

[25]  Mohammad Javad Golkar,et al.  A hybrid method consisting of GA and SVM for intrusion detection system , 2016, Neural Computing and Applications.

[26]  D. Dasgupta,et al.  Immunity-based systems: a survey , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[27]  Ritu Nagpal,et al.  Intrusion Detection System Using Genetic Algorithm-A Review , 2012 .

[28]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[29]  Ayush Sharma,et al.  Genetic Algorithm Based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks , 2012, 2012 IEEE 12th International Conference on Data Mining Workshops.

[30]  R. Remya,et al.  A hybrid method based on genetic algorithm, self-organised feature map, and support vector machine for better network anomaly detection , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[31]  Julie Greensmith,et al.  Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.

[32]  Paul A. Watters,et al.  Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures , 2011, AusDM.

[33]  Md. Abu Naser Bikas,et al.  An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.

[34]  Feng Wang,et al.  A Survey of Artificial Immune System Based Intrusion Detection , 2014, TheScientificWorldJournal.

[36]  Wei Li,et al.  Using Genetic Algorithm for Network Intrusion Detection , 2004 .

[37]  Natarajan Meghanathan,et al.  Advances in Computer Science and Information Technology. Networks and Communications , 2012, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

[38]  Lalit M. Patnaik,et al.  Genetic algorithms: a survey , 1994, Computer.

[39]  Liu Hean,et al.  Research on False Alarm Rate of Intrusion Detection based on Cloning Immune Method , 2013 .

[40]  Alejandro Zunino,et al.  An empirical comparison of botnet detection methods , 2014, Comput. Secur..