Intrusion Detection System Using Genetic Algorithm
||International Journal of P2P Network Trends and Technology (IJPTT)||
|© 2011 by IJPTT Journal|
|Year of Publication : 2011|
|Authors : Ch.Satya Keerthi.N.V.L,P.Lakshmi prasanna,B.Minny Priscilla,M.V.B.T.Santhi|
Ch.Satya Keerthi.N.V.L,P.Lakshmi prasanna,B.Minny Priscilla,M.V.B.T.Santhi."Intrusion Detection System Using Genetic Algorithm". International Journal of P2P Network Trends and Technology (IJPTT), V1(2):1-7 Sep - Oct 2011, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.
This paper shows how network connection information can be modeled as chromosomes. The objective of the system is to create a new set of rules during run time. So the intruder cannot be able to attack the system with virus. The Intrusion Detection System in Networking Using Genetic Algorithm (IDS) is to identify the intruder and block the data from the intruder to avoid the system attack by the virus. This new system is a replacement of the existing system. In existing system, at run time it will not create a set of rules. The major components of the system are creating new set of rules during run time. ication, confidentiality and integrity, are provided in cloud computing system.
 A Hidden Markov Models-Based Anomaly Intrusion Detection Method. Ye Du, Huiqiang Wang and Yonggang Pang.
 What is Computer Security. Matt Bishop
 Protocol Scrubbing: Network Security through Transparent Flow Modification. David Watson, Matthew Smart, G. Robert Malan, Farnam Jahanian.
 An Active Network–Based Intrusion Detection And Response Systems. Han-Pang Huang, Chia-Ming Chang.
Intrusion detection, Genetic algorithm, Data set, Client, Server.