Genetic Annealing-Based IDS System for Attack Detection

Through proposed work, a new trend of machine learning based on evolution and genetics has been tried to be brought in an innovative way. IDS has been a part of our system development for a very long time, but there is no very effective way to create a new and very efficient system. Due to increasing use of computers and new technologies, threat to the system information has been increasing at an alarming rate. The first step toward it is to increase the capability of the system to detect the attacks and then to encounter them. So, here a new approach has been proposed to detect the attacks with high precision and accuracy. The proposed approach gives a new term “genetic annealing,” which is a hybrid of genetic algorithm and simulated annealing technique. The results show the effectiveness of the results, and the proper working of the algorithm is explained in the paper.

[1]  A. Kannan,et al.  Intrusion detection using optimal genetic feature selection and SVM based classifier , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).

[2]  Dipika Narsingyani,et al.  Optimizing false positive in anomaly based intrusion detection using Genetic algorithm , 2015, 2015 IEEE 3rd International Conference on MOOCs, Innovation and Technology in Education (MITE).

[3]  Sachi Nandan Mohanty,et al.  A Hybrid Approach for Network Intrusion Detection , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[4]  A. R. Roy,et al.  An application of soft sets in a decision making problem , 2002 .

[5]  Mustafa Mat Deris,et al.  A Direct Proof of Every Rough Set is a Soft Set , 2009, 2009 Third Asia International Conference on Modelling & Simulation.

[6]  Vivek Tiwari,et al.  Improving Accuracy for Intrusion Detection through Layered Approach Using Support Vector Machine with Feature Reduction , 2016, WIR '16.

[7]  C Hemalatha,et al.  A New Data Mining Based Network Intrusion Detection Model , 2012 .

[8]  Rishi Soni,et al.  Privacy Preservation in Utility Mining Based on Genetic Algorithm: A New Approach , 2015, SocProS.

[9]  J. Jabez,et al.  A study on genetic-fuzzy based automatic intrusion detection on network datasets , 2012, ICSE 2012.

[10]  Lawrence. Davis,et al.  Handbook Of Genetic Algorithms , 1990 .

[11]  Arthur B. Maccabe,et al.  The architecture of a network level intrusion detection system , 1990 .

[12]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[13]  Salvatore J. Stolfo,et al.  Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.

[14]  Andrew H. Sung,et al.  Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).