An Intrusion Detection System Based on NSGA-II Algorithm

Attack detection is one of the most important issues for computer networks security. Intrusion Detection System (IDS) monitors network for malicious activity. In this paper, a method is proposed to identify the attacks in IDS. This method generates rule sets for Intrusion Detection System using non-dominated sorting genetic algorithm (NSGA-II). NSGA-II is one type of multi objective genetic algorithms. This method considers features of computer connection and defines two different fitness functions for generating the rules. The advantage of this method compared with previous methods which applied Evolutionary Algorithm. Since some methods applied one fitness function or convert many objectives to single objective, they lost many features.

[1]  Pedro A. Diaz-Gomez,et al.  Improved Off-Line Intrusion Detection Using a Genetic Algorithm , 2005, ICEIS.

[2]  S. Murty Bhallamudi,et al.  Multiobjective Optimal Waste Load Allocation Models for Rivers Using Nondominated Sorting Genetic Algorithm-II , 2006 .

[3]  Kalyanmoy Deb,et al.  A Fast Elitist Non-dominated Sorting Genetic Algorithm for Multi-objective Optimisation: NSGA-II , 2000, PPSN.

[4]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[5]  A. O. Eboka,et al.  Genetic Algorithm Rule-Based Intrusion Detection System (GAIDS) , 2012 .

[6]  Jonathan M. Garibaldi,et al.  Evolving OWA operators for cyber security decision making problems , 2013, 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[7]  Jaideep Srivastava,et al.  Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing) , 2005 .

[8]  Anup Goyal,et al.  GA-NIDS : A Genetic Algorithm based Network Intrusion Detection System , 2007 .

[9]  Rajdeep Borgohain,et al.  FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems , 2012, ArXiv.

[10]  Santosh Kumar,et al.  Genetic Algorithms in Intrusion Detection Systems: A Survey , 2014 .

[11]  Shrikant Lade,et al.  An Evolutionary Approach to Intrusion Detection System using Genetic Algorithm , 2012 .

[12]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[13]  Salim Hariri,et al.  An efficient network intrusion detection method based on information theory and genetic algorithm , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[14]  G. Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[15]  Gyuwan Kim,et al.  HOST-BASED INTRUSION DETECTION SYSTEMS , 2016 .

[16]  Kalyanmoy Deb,et al.  A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..

[17]  Nivedita Naidu,et al.  An Effective Approach to Network Intrusion Detection System using Genetic Algorithm , 2010 .