International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 1 | Issue 2 | Year 2011 | Article Id. IJPTT-V1I2P401 | DOI : https://doi.org/10.14445/22492615/IJPTT-V1I2P401

Intrusion Detection System Using Genetic Algorithm


Ch.Satya Keerthi.N.V.L,P.Lakshmi prasanna,B.Minny Priscilla,M.V.B.T.Santhi

Citation :

Ch.Satya Keerthi.N.V.L,P.Lakshmi prasanna,B.Minny Priscilla,M.V.B.T.Santhi, "Intrusion Detection System Using Genetic Algorithm," International Journal of P2P Network Trends and Technology (IJPTT), vol. 1, no. 2, pp. 1-6, 2011. Crossref, https://doi.org/10.14445/22492615/IJPTT-V1I2P401

Abstract

This paper shows how network connection information can be modeled as chromosomes. The objective of the system is to create a new set of rules during run time. So the intruder cannot be able to attack the system with virus. The Intrusion Detection System in Networking Using Genetic Algorithm (IDS) is to identify the intruder and block the data from the intruder to avoid the system attack by the virus. This new system is a replacement of the existing system. In existing system, at run time it will not create a set of rules. The major components of the system are creating new set of rules during run time. ication, confidentiality and integrity, are provided in cloud computing system.

Keywords

Intrusion detection, Genetic algorithm, Data set, Client, Server.

References

[1] Network Intrusion Detection: Evasion, Traffic Normalization and End-toEnd Protocol Semantics. Mark Handley and Vern Paxson.
[2] Intrusion Detection Based On Hidden Markov Model. Qing-Bo Yin, LiRan Shen, Ru-Bo Zhang, Xue-Yao Li, Hui-Qiang Wang.
[3] A Hidden Markov Models-Based Anomaly Intrusion Detection Method. Ye Du, Huiqiang Wang and Yonggang Pang.
[4] What is Computer Security. Matt Bishop
[5] Protocol Scrubbing: Network Security through Transparent Flow Modification. David Watson, Matthew Smart, G. Robert Malan, Farnam Jahanian.
[6] An Active Network–Based Intrusion Detection And Response Systems. Han-Pang Huang, Chia-Ming Chang.