Rule Based Network Security Using Genetic Algorithm

Jeya S*, Ramar K**
*Associate professor in the K.S.R College of Engineering, Tiruchengode.
**Head. CSE Department, National Engineering College, Kovilpatti, Tamil Nadu, India.
Periodicity:April - June'2007
DOI : https://doi.org/10.26634/jse.1.4.760

Abstract

This paper describes a technique of applying Genetic Algorithm (GA) to network security. As the transmission of data over the Internet increases, the need to protect connected systems also increases. Rule based network security is the latest technology used for this purpose. Although the field of network security is still developing, the systems that do exist are still not complete, in the sense that they are not able to detect all types of intrusions. Some attacks which are detected by various tools available today cannot be detected by other products, depending on the types and methods that they are built on. Using a Genetic Algorithm is one of the methods that detect intrusions. The focus of this paper is to introduce the application of GA, in order to improve the effectiveness of network security. Unlike other implementations of the same problem, this implementation considers both temporal and spatial information of network connections in encoding the network connection information into rules in network security. This is helpful for identification of complex anomalous behaviors. This work is focused on the TCP/IP network protocols.

Keywords

Crossover, Mutation, Fitness, Genetic Algorithm and Chromosome

How to Cite this Article?

Jeya S and Ramar K (2007). Rule Based Network Security Using Genetic Algorithm. i-manager’s Journal on Software Engineering, 1(4), 85-91. https://doi.org/10.26634/jse.1.4.760

References

[1]. Bezroukov, Nikolai, "intrusion Dection (general issues)" , Sof t panorama: open Sourc e Sof tware Educational Society.URL:htfp://www,softpanorama.org/ Security/ intrusion_detection,html ( I 9 July 2003).
[2]. Bridges,Susan, and Rayford B.Vaughn, "Intrusion Detection Via Fuzzy Data Mining" , In Proceedings of I 2h Annual Canadian Technology Security Symposium, pp. 109_122. Ottawa, Canada (2000).
[3]. Crosbie, Mark, and Gene Spafford, "Applying Genetic Programming to intrusion Detection." In proceedings of I 995 AAA! Fall Symposium on Genetic Programming, pp. I -8 Cambridge, Massachusetts. URL: http://citeseer~nj.nec.com/ crosbie95appiying.html
[4]. Graham, Robert, "FAQ: Network Intrusion Detection Systems". RobertGraham.corn Homepage, URL:http://www.robertgraham.com/pubs/network_intrusi on_detection.htmi (Mar. 21, 2000).
[5]. Jones, Anita. K and Robert S.Sielken, "Computer System Intrusion Detection: A Survey". Technical Report Department of computer Science, University of Virginia, Charlottesville, Virgina (2000).
[6]. Li, Wei, "The integration of security sensors into the intelligent Intrusion Detection System (HOS) in a cluster environment" . Master's Project Report, Department of Computer Science, Mississippi State University (2002).
[7]. Masanori Hariyama, Tetsuya Aoyama, and Michitaka kameyama, "Genetic Approach to Minimizing Energy consumption of VLSI Processors using multiple supply Voltages", IEEE Translations on Computers Vol.54, No. 6, June 2005.
[8]. McHugh, John, "intrusion and Intrusion Detection", Technical Report, CERT Coordination Center, Software Engineering Instifife, Carnegic Mellon University (200 I ).
[9]. Ortiz-Boyer D., Hervas-Martinez C and Garcia- Pedrajas N, "A Crossover Operator for Evolutionary Algorithms Based On Population Features", Journal of Artificial lnteliigenceResearch, Vol 24, page 1-48,(2005),
[1O]. Pohlheim Hartmut, "Genetic and Evolutionary Algorithms: Principles, methods and Algorithms", Genetic and Evolutionary Algorithm Toolbox, Harfmut Pohlheim. URL: http://www.geatbx,com/ docu/algindex.html (2003).
[1 I ]. Sinclair, Chris, Lyn Pierce, and Sara Matzner, "An Application of Machine Learning to Network Intrusion Detection" . In Proceeding of 1 999 Annual Computer Security Applications Conf. (ACSAC), pp, 3 71-3 7 7 , Phoenix, Arizona, URL:http://www.acsac.org/ papers/fro-b I 030-sinciair.pdf. (1999).
[12]. Wei Li, "Using Genetic Algorithm for Network Intrusion Detection" . Department of Computer Science and Engineering, Mississippi State University, MS 39762, Email: wli@cse.msstate.edu(2005).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.