Data stream classification Detection System Using Genetic Algorithm

Jeya S*, S. Muthu Perumal Pillai**
* Professor & Head, M.C.A. Department, PET Engineering College, Vallioor, Tamil Nadu, India.
** Assistant Professor, M.C.A. Department, PET Engineering College, Vallioor, Tamil Nadu, India.
Periodicity:July - September'2011
DOI : https://doi.org/10.26634/jse.6.1.1537

Abstract

The transmission of data over the Internet increases, the need to protect connected systems also increases. Although the field of IDSs is still developing, the systems that do exist are still not complete, in the sense that they are not able to detect all types of intrusions. Some attacks which are detected by various tools available today cannot be detected by other products, depending on the types and methods that they are built on. Data stream classification (DSC) Detection System Using Genetic Algorithm (GA) is the latest technology used for this purpose. The behavior of the genetic algorithm, a popular approach to search and optimization problems, is known to depend, among other factors, on the fitness function formula, the recombination operator, and the mutation operator. In real-world data stream classification problems, such as intrusion detection, text classification, and fault detection novel classes may appear at any time in the stream. Traditional data stream classification techniques would be unable to detect intrusion until the classification models are trained with Genetic algorithm. We applied this technique in network traffic. The network intrusion detection system should be adaptable to all type of critical situations arise in network. This is helpful for identification of complex anomalous behaviors. This work is focused on the TCP/IP network protocols. Data stream classification pose many challenges, some of which have not been addressed yet.

Keywords

Genetic Algorithm, Crossover, Mutation, Network Sniffer, TCPDump and Data stream classification.

How to Cite this Article?

S. Jeya and S. Muthu Perumal Pillai (2011). Data Stream Classification Detection System Using Genetic Algorithm. i-manager’s Journal on Software Engineering, 6(1), 36-44. https://doi.org/10.26634/jse.6.1.1537

References

[1]. Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter and Eike Kohnert, (2010). “A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem”, IEEE Transactions On Computers, pp. 1533-1546, Vol. 59, No. 11, November.
[2]. Akrivi Vlachou, Christos Doulkeridis, Yannis Kotidis and Michalis Vazirgiannis, (2010). “Efficient Routing of Subspace Skyline Queries over Highly Distributed Data”, IEEE Transactions on Knowledge and Data Engineering, pp. 1694-1708, Vol. 22, No. 12, December.
[3]. Ashish Kamra and Elisa Bertino, (2011). “Design and Implementation of an Intrusion Response System for Relational Databases”, IEEE Transactions on Knowledge and Data Engineering, pp.875-888, Vol. 23, No. 6, June 2011.
[4]. P.A. Bonatti, J.L. De Coi, D. Olmedilla, and L. Sauro, (2010). ”A Rule-Based Trust Negotiation System”, IEEE Transactions on Knowledge and Data Engineering, pp. 1507-1514, Vol. 22, No. 11, November.
[5]. M. Brian Blake, and Michael F. Nowlan, “Knowledge Discovery in Services (KDS): Aggregating Software Services to Discover Enterprise Mashups”, IEEE Transactions on Knowledge and Data Engineering, pp.889-901, Vol. 23, No. 6, June 2011.
[6]. Chun-I Fan, Ling-Ying Huang and Pei-Hsiu Ho, “Anonymous Multireceiver Identity-Based Encryption”, IEEE Transactions on Computers, pp. 1239- 1249, vol. 59, No. 9, September 2010.
[7]. Claudia Marinica and Fabrice Guillet, “Knowledge- Based Interactive Postmining of Association Rules Using Ontologies”, IEEE Transactions on Knowledge and Data Engineering, pp. 784-798, Vol. 22, No. 6, June 2010.
[8]. Domenico Ficara, Andrea Di Pietro, Stefano Giordano, Gregorio Procissi, Fabio Vitucci, and Gianni Antichi, “Differential Encoding of DFAs for Fast Regular Expression Matching”, IEEE/ACM Transactions on Networking, pp.683-694, Vol. 19, No. 3, June 2011.
[9]. Dominik Fisch, Thiemo Gruber, and Bernhard Sick, (2011). “SwiftRule: Mining Comprehensible Classification Rules for Time Series Analysis”, IEEE Transactions on Knowledge and Data Engineering, Vol. 23, No. 5, May.
[10]. Emilio Miguela, Pedro, Keith E. Brown, Yvan R. Petillot, and David M. Lane, (2011). “Semantic Knowledge-Based Framework to Improve the Situation Awareness of Autonomous Underwater Vehicles”, IEEE Transactions on Knowledge and Data Engineering, pp.759-773, Vol. 23, No. 5, May.
[11]. Eric Hsueh-Chan Lu, Vincent S. Tseng, Member, IEEE, and Philip S. Yu, (2011). “Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service Environments”, IEEE Transactions on Knowledge And Data Engineering, pp.914-927, Vol. 23, No. 6, June.
[12]. Hannes Frey and Ivan Stojmenovic, (2010). “On Delivery Guarantees and Worst-Case Forwarding Bounds of Elementary Face Routing Components in Ad Hoc and Sensor Networks”, IEEE Transactions on Computers, pp.1224-1238, Vol. 59, No. 9, September.
[13]. Hua Lu, and Man Lung Yiu, (2011). “On Computing Farthest Dominated Locations”, IEEE Transactions on Knowledge And Data Engineering, Vol. 23, No. 6, June.
[14]. Hyunjin Lee, Sangyeun Cho and Bruce R. Childers, (2010). “PERFECTORY: A Fault-Tolerant Directory Memory Architecture”, IEEE Transactions on Computers, pp. 638- 650, Vol. 59, No. 5, May.
[15]. Ioannis Hatzilygeroudis, and Jim Prentzas, (2010). “Integrated Rule-Based Learning and Inference”, IEEE Transactions on Knowledge and Data Engineering, pp. 1549-1563, Vol. 22, No. 11, November.
[16]. Irem Y. Tumer, and Carol S. Smidts, (2011). “Integrated Design-Stage Failure Analysis of Software- Driven Hardware Systems”, IEEE Transactions on Computers, pp.1072-1084, Vol. 60, No. 8, August .
[17]. Javier Carretero, Xavier Vera, Pedro Chaparro, and Jaume Abella, (2010). “Microarchitectural Online Testing for Failure Detection in Memory Order Buffers”, IEEE Transactions on Computers, pp. 623-637, Vol. 59, No. 5, May.
[18]. Mahesh Balakrishnan, Tudor Marian, Kenneth P. Birman, Hakim Weatherspoon, and Lakshmi Ganesh, (2011). “Maelstrom: Transparent Error Correction for Communication Between Data Centers”, IEEE/ACM Transactions on Networking, pp.617-629, Vol. 19, No. 3, June.
[19]. Matt Duckham, Doron Nussbaum, (2011). “Efficient, Decentralized Computation of the Topology of Spatial Regions”, IEEE Transactions on Computers, pp.1100- 1113, Vol. 60, No. 8, August.
[20]. Mehran Mozaffari-Kermani and Arash Reyhani- Masoleh, (2010). “Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard”, IEEE Transactions on Computers, pp.608-623, Vol. 59, No. 5, May.
[21]. Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, and Bhavani Thuraisingham, (2011). “Classification and Novel Class Detection in Concept- Drifting Data Streams under Time Constraints”, IEEE Transactions on Knowledge And Data Engineering, pp.859-874 , Vol. 23, No. 6, June.
[22]. Panagiotis Papadimitriou and Hector Garcia- Molina, (2011). “Data Leakage Detection”, IEEE Transactions on Knowledge and Data Engineering, pp.51-64, Vol. 23, No. 1, January 2011.
[23]. Rachid Hadjidj and Hanifa Boucheneb, (2011). “Efficient Reachability Analysis for Time Petri Nets”, IEEE Transactions on Computers, Vol. 60, No. 8, August 2011.
[24]. Songqing Chen, Shiping Chen, Xinyuan Wang, Zhao Zhang and Sushil Jajodia, (2010). “An Application- Level Data Transparent Authentication Scheme without Communication Overhead”, IEEE Transactions on Computers, pp. 943-954, Vol. 59, No. 7, July 2010.
[25]. Yu-Wei Eric Sung, Xin Sun, Sanjay G. Rao, Geoffrey G. Xie, and David A. Maltz, (2011). “Towards Systematic Design of Enterprise Networks”, IEEE/ACM Transactions on Networking, pp.695-707, Vol. 19, No. 3, June 2011.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.