Intrusion detection system using fuzzy genetic algorithm

Computer security has become an important part of the day today's life. Not only single computer systems but an extensive network of the computer system also requires security. In achieving the safety of the systems, an Intrusion Detection System (IDS) plays a significant role. IDS is a software that monitors the computer network and detects the suspicious activities that occur in the systems or network. The process of intrusion detection includes detecting intrusion. Intrusion is a suspicious activity attempted by the attacker. This paper presents a fuzzy-genetic approach to detecting network intrusion. Paper presents the results of the proposed system in terms of accuracy, execution time, and memory allocation. To implement and measure the performance of the system the KDD99 benchmark dataset is used. The KDD99 dataset is a benchmark dataset that researchers use in various network security researches. Genetic algorithm includes a development and collection that uses a chromosome like data structure and develop the chromosomes using selection, crossover and mutation operators. Fuzzy rule sorts network attack data.

[1]  S. Bridges INTRUSION DETECTION VIA FUZZY DATA MINING , 2000 .

[2]  Terrence P. Fries,et al.  A fuzzy-genetic approach to network intrusion detection , 2008, GECCO '08.

[3]  N. Wattanapongsakorn,et al.  Real-time intrusion detection with fuzzy genetic algorithm , 2013, 2013 10th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.

[4]  Jacinth Salome,et al.  Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection , 2007 .

[5]  Naruemon Wattanapongsakorn,et al.  Fuzzy-ART in network anomaly detection with feature-reduction dataset , 2011, 7th International Conference on Networked Computing.

[6]  Wei Lu,et al.  Detecting New Forms of Network Intrusion Using Genetic Programming , 2004, Comput. Intell..

[7]  Jonatan Gómez,et al.  A Fuzzy Set/Rule Distance for Evolving Fuzzy Anomaly Detectors , 2006, 2006 IEEE International Conference on Fuzzy Systems.

[8]  Eugene H. Spafford,et al.  Applying Genetic Programming to Intrusion Detection , 1995 .