Genetic Algorithm's Fitness Value and False Positive in Network Intrusion Detection System

Jeya S*
* Assistant Professor & Head, Department of M. C. A., PET Engineering College, Tirunelveli District, Tamil Nadu.
Periodicity:October - December'2008
DOI : https://doi.org/10.26634/jse.3.2.244

Abstract

Network Intrusion detection systems aim is to detect attacks against computer systems and networks. This paper focuses on the development of Genetic Algorithm in Intrusion Detection System (GAIDS). Genetic Algorithms can provide appropriate heuristic search methods. However, balancing the need to detect all possible attacks found in network with the need to avoid false positives is a challenge, given the scalar fitness values required by Genetic Algorithms. This study discusses a fitness function independent of variable parameters to overcome this problem. This fitness function allows the IDS to significantly reduce both its false positive and false negative rate.

Keywords

Chromosome, Network sniffers, Niching technique, Crossover and Mutation

How to Cite this Article?

Jeya S (2008). Genetic Algorithm's Fitness Value and False Positive in Network Intrusion Detection System. i-manager’s Journal on Software Engineering, 3(2),14-19. https://doi.org/10.26634/jse.3.2.244

References

[1]. Chaker Katar, “Combining Multiple Techniques for Intrusion Detection”, International Journal of Computer Science and Network Security, Vol.6 No.2B, February 2006.
[2]. Dong Seong Kin, Ha Nam Ngugen, Jong Sou Park, “Genetic Algorithm to improve SVM based Network Intrusion Detection System”, Advanced information Networking and Application, Vol.2, Pg.155-158, March 28-30, 2005.
[4]. Geer D. “Behavior based Network Security goes mainstream”, IEEE Computer Society, Vol 39, issue 3, Pg. 14-17, March 2006.
[5]. Huaizhi Li, Mukesh Singhal, “Trust Management in Distributed System”, IEEE Computer Society, Vol 40, issue 2, Pg. 45-53, Feb. 2007.
[6]. Huntley C. L. “A developmental view of System security”, IEEE Computer Society, Vol 39, issue 1, Pg 113-114, Jan 2006.
[7]. Kemmerer R. A., Vigna G., “Hi DRA: Intrusion Detection for internet Security”, Proceedings of the IEEE, Vol. 93, issue 10, Pg. 1848-1857, Oct. 2005.
[8]. Kemmerer R. A., Vigna G., “Intrusion detection: a brief history and overview”, IEEE Computer Society, Vol. 35,issue 4, Pg. 27-30, April 2002.
[9]. Leckie T., Yasinsac A., “Metadata for Anomaly based Security Protocol attack Detection”, IEEE Transaction on Knowledge and Data Engineering, Vol. 16, issue 9, Pg. 1157-1168, Sept. 2004.
[10]. Nong Ye, Farley T., “A Scientific approach to cyber attack detection”, IEEE Computer Society, Vol. 38, issue 11, Pg. 55-61, Nov. 2005.
[11]. Sang Long Pao T., Po Wei Wang, “Net flow based Intrusion Detection System”, IEEE international Conference on Networking sensing & Control, Vol.2, Pg. 731-736, 2004.
[12]. Sang Jun Han, Sung Bae Cho, “Evolutionary neural network for anomaly detection based on the behaviour of a program”, IEEE Transaction on Systems, Man and Cybernetics, Part B, Vol. 36, issue 3, Pg. 559-570, June 2006.
[13]. Vijairagavan V., Shah D., Galgali P., Shah D. Srinivasan V., Bhatia L., “Marking Technique to isolate boundary router and attacker”, IEEE Computer Society, Vol. 40, issue 2, Pg. 54-58, Feb. 2007.
[14]. Ying Dar Lin, Chih Wei Jan, Po Ching Lin, Yuan Cheng Lai, “Designing an integrated Architecture for Network Content Security Gateways”, IEEE Computer Society, Vol. 39, issue 11, Pg. 66-72, Nov. 2006.
[15]. Yu F. Laksman T.V., Motoyarna M. A., Kata R. H., “Efficient Multi match Packet classification for Network Security Application”, IEEE Journal on Selected areas in Communications, Vol. 24, issue 10, Pg. 1805-1816, Oct. 2006.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.