Research Article | Open Access | Download PDF
Volume 1 | Issue 2 | Year 2011 | Article Id. IJPTT-V1I2P401 | DOI : https://doi.org/10.14445/22492615/IJPTT-V1I2P401Intrusion Detection System Using Genetic Algorithm
Ch.Satya Keerthi.N.V.L,P.Lakshmi prasanna,B.Minny Priscilla,M.V.B.T.Santhi
Citation :
Ch.Satya Keerthi.N.V.L,P.Lakshmi prasanna,B.Minny Priscilla,M.V.B.T.Santhi, "Intrusion Detection System Using Genetic Algorithm," International Journal of P2P Network Trends and Technology (IJPTT), vol. 1, no. 2, pp. 1-6, 2011. Crossref, https://doi.org/10.14445/22492615/IJPTT-V1I2P401
Abstract
This paper shows how network connection information can be modeled as chromosomes. The objective of the system is to create a new set of rules during run time. So the intruder cannot be able to attack the system with virus. The Intrusion Detection System in Networking Using Genetic Algorithm (IDS) is to identify the intruder and block the data from the intruder to avoid the system attack by the virus. This new system is a replacement of the existing system. In existing system, at run time it will not create a set of rules. The major components of the system are creating new set of rules during run time. ication, confidentiality and integrity, are provided in cloud computing system.
Keywords
Intrusion detection, Genetic algorithm, Data set, Client, Server.
References
[1] Network Intrusion Detection: Evasion, Traffic Normalization and End-toEnd Protocol Semantics. Mark Handley and Vern Paxson.
[2] Intrusion Detection Based On Hidden Markov Model. Qing-Bo Yin, LiRan Shen, Ru-Bo Zhang, Xue-Yao Li, Hui-Qiang Wang.
[3] A Hidden Markov Models-Based Anomaly Intrusion Detection Method.
Ye Du, Huiqiang Wang and Yonggang Pang.
[4] What is Computer Security. Matt Bishop
[5] Protocol Scrubbing: Network Security through Transparent Flow
Modification. David Watson, Matthew Smart, G. Robert Malan, Farnam
Jahanian.
[6] An Active Network–Based Intrusion Detection And Response Systems.
Han-Pang Huang, Chia-Ming Chang.