Artificial Immune System Inspired Intrusion Detection System Using Genetic Algorithm

Computer security is an issue that will always be under investigation as intruders never stop to find ways to access data and network resources. Researches try to find functions and approaches that would increase chances to detect attacks and at the same time would be less expensive, regarding time and space. In this paper, an approach is applied to detect anomalous activity in the network, using detectors generated by the genetic algorithm. The Minkowski distance function is tested versus the Euclidean distance for the detection process. It is shown that it Minkowski distance give better results than the Euclidean distance, and can give very good results using less time. It gives an overall average detection rate of 81.74% against 77.44% with the Euclidean distance. In addition, formal concept analysis was applied on the data set containing only the selected features and used to visualize correlation between highly effective features. Povzetek: Predstavljena je varnostna metoda na osnovi umetnega imunskega sistema.

[1]  Ole J Mengshoel,et al.  The Crowding Approach to Niching in Genetic Algorithms , 2008, Evolutionary Computation.

[2]  Václav Snásel,et al.  Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[3]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[4]  D. Dasgupta,et al.  Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.

[5]  Md. Abu Naser Bikas,et al.  An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.

[6]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[7]  Amedeo Napoli,et al.  Two FCA-Based Methods for Mining Gene Expression Data , 2009, ICFCA.

[8]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[9]  Fan Li Hybrid Neural Network Intrusion Detection System Using Genetic Algorithm , 2010, 2010 International Conference on Multimedia Technology.

[10]  Varun Chandola,et al.  Anomaly detection for symbolic sequences and time series data , 2009 .

[11]  Wei Li,et al.  Using Genetic Algorithm for Network Intrusion Detection , 2004 .

[12]  M. Sadiq Ali Khan,et al.  Rule based Network Intrusion Detection using Genetic Algorithm , 2011 .

[13]  Macia-FernandezG.,et al.  Anomaly-based network intrusion detection , 2009 .

[14]  G. Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[15]  Giovanni Vigna,et al.  Intrusion detection: a brief history and overview , 2002 .

[16]  Wei Lu,et al.  Detecting New Forms of Network Intrusion Using Genetic Programming , 2004, Comput. Intell..

[17]  Jan H. P. Eloff,et al.  An approach to implement a network intrusion detection system using genetic algorithms , 2004 .

[18]  Richard Cole,et al.  Using Conceptual Scaling In Formal Concept Analysis For Knowledge And Data Discovery In Medical Text , 1998 .

[19]  Hossein Shirazi,et al.  An Intelligent Intrusion Detection System Using Genetic Algorithms and Features Selection , 2010 .

[20]  Graham Kendall,et al.  Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques , 2013 .

[21]  Reyadh Naoum,et al.  Fitness Function for Genetic Algorithm used in Intrusion Detection System , 2012 .

[22]  Tarek S. Sobh,et al.  A cooperative immunological approach for detecting network anomaly , 2011, Appl. Soft Comput..

[23]  Vivek K. Kshirsagar,et al.  Intrusion Detection System using Genetic Algorithm and Data Mining: An Overview , 2012 .

[24]  Aboul Ella Hassanien,et al.  Detectors generation using genetic algorithm for a negative selection inspired anomaly network intrusion detection system , 2012, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS).

[25]  Fernando Niño,et al.  Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..

[26]  Jonathan Timmis,et al.  Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[27]  Anup Goyal,et al.  GA-NIDS : A Genetic Algorithm based Network Intrusion Detection System , 2007 .

[28]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.