DocumentCode :
3238555
Title :
Evolutionary methods for detecting network intrusions
Author :
Al-Sharafat, Wafa Slaibi
Author_Institution :
Prince Hussein Bin Abdullah Coll. for Inf. Technol., Al Al-Bayt Univ., Mafraq, Jordan
fYear :
2010
fDate :
2-4 Nov. 2010
Firstpage :
354
Lastpage :
358
Abstract :
Intrusion detection (ID) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, availability, or to bypass the security mechanisms of a computer or network. Internet services, and the number of Internet users increases every day this makes networks as a window for malicious users to do their damage becomes very great and lucrative. The objective of this paper is to incorporate different methods to detect and classify intrusion from normal network packet. Among several evolutionary techniques, Steady State Genetic-based Machine Leaning Algorithm (SSGBML) will be used to detect intrusions with Zeroth Level Classifier system (ZCS) are investigated here. Steady State Genetic Algorithm (SSGA) is used as a discovery mechanism instead of Simple Genetic Algorithm ( SGA). SGA replaces all old rules with new produced rule preventing old good rules from participating in the next rule generation. In contrast, SSGA gives a chance for previous rules to participate in new generations. ZCS is used to play the role of detector by matching incoming environment message with classifiers to determine whether the current message is normal or intrusion and receiving feedback from environment. The experiments and evaluations of the proposed method were performed with the KDD 99 intrusion detection dataset.
Keywords :
Internet; computer network security; genetic algorithms; learning (artificial intelligence); pattern classification; Internet service; KDD 99 intrusion detection dataset; Zeroth level classifier system; computer network; discovery mechanism; event monitoring; evolutionary method; network intrusion detection; steady state genetic-based machine leaning algorithm; Algorithm design and analysis; Artificial neural networks; Computational modeling; Detectors; Fires; Monitoring; Probes; Network Intrusion Detection; SGA; SSGA; SSGBML; ZCS; component;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Technology and Development (ICCTD), 2010 2nd International Conference on
Conference_Location :
Cairo
Print_ISBN :
978-1-4244-8844-5
Electronic_ISBN :
978-1-4244-8845-2
Type :
conf
DOI :
10.1109/ICCTD.2010.5645857
Filename :
5645857
Link To Document :
بازگشت