DocumentCode :
3345354
Title :
A hybrid intelligent HIDS model using two-layer genetic algorithm and neural network
Author :
Torkaman, Atefeh ; Javadzadeh, Ghazaleh ; Bahrololum, Marjan
fYear :
2013
fDate :
28-30 May 2013
Firstpage :
92
Lastpage :
96
Abstract :
Host Intrusion detection systems (HIDS) are increasingly emerging techniques for information security on host based applications. These systems should be designed to prevent unauthorized access of system resources and data. Many intelligent learning techniques are currently being applied to the large volumes of data for the construction of an efficient host intrusion detection system. This paper represents a hybrid approach for modeling HIDS combines anomaly, misuse detection, based on two-layer Genetic algorithm and neural network which uses simple data mining techniques to process the web application traffics. Two-layer Genetic algorithm and neural network are applied respectively as anomaly and misuse detection. Suspicious intrusions can be traced back to its original source. The proposed model is able to detect critical vulnerabilities based on Open Web Application Security Project (OWASP).
Keywords :
Internet; authorisation; data mining; genetic algorithms; learning (artificial intelligence); neural nets; OWASP; Open Web Application Security Project; Web application traffics; anomaly detection; critical vulnerabilities detection; data mining techniques; host based applications; host intrusion detection systems; hybrid intelligent HIDS model; information security; intelligent learning techniques; misuse detection; neural network; suspicious intrusions; system data; system resources; two-layer genetic algorithm; unauthorized access; Algorithm design and analysis; Classification algorithms; Data mining; Genetic algorithms; Intrusion detection; Neural networks; Genetic algorithm; Host Intrusion Detection System (HIDS); Web application attacks; neural network;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Knowledge Technology (IKT), 2013 5th Conference on
Conference_Location :
Shiraz
Print_ISBN :
978-1-4673-6489-8
Type :
conf
DOI :
10.1109/IKT.2013.6620045
Filename :
6620045
Link To Document :
بازگشت