2010
DOI: 10.5539/cis.v3n4p80
|View full text |Cite
|
Sign up to set email alerts
|

ID-SOMGA: A Self Organising Migrating Genetic Algorithm-Based Solution for Intrusion Detection

Abstract: The study examined the detection of attacks against computer networks, which is becoming a harder problem to solve in the field of Network security. A problem with current intrusion detection systems is that they have many false positive and false negative events. Most of the existing Intrusion detection systems implemented depend on rule-based expert systems where new attacks are not detectable. In this study, optimization algorithms were added to intrusion detection system to make them more efficient. Self O… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…Relative advantage is a form of drive that encourages technology adoption (Iacovou, Benbasat & Dexter, 1995). The literature on information systems shows that the more an organisation presumes the probable advantage of a technology, the more likely the organisation would initiate adoption (Folorunso, Vincent, Adekoya & Ogunde, 2010;Al-Jabri & Sohail, 2012).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Relative advantage is a form of drive that encourages technology adoption (Iacovou, Benbasat & Dexter, 1995). The literature on information systems shows that the more an organisation presumes the probable advantage of a technology, the more likely the organisation would initiate adoption (Folorunso, Vincent, Adekoya & Ogunde, 2010;Al-Jabri & Sohail, 2012).…”
Section: Literature Reviewmentioning
confidence: 99%
“…In all, feature selections are often grouped into two, namely; filter and wrapper approaches [5,6,12]. By adopting a filter is a classifier agnostic pre-selection methods which are independent of the applied machine learning algorithm.…”
Section: A Distinctions Between Filter and Wrapper Approachesmentioning
confidence: 99%
“…Furthermore, Intrusion Detection System (IDS) according to [5,6,12], is viewed as a system which constantly and dynamically monitors a system with the primary aim of identifying and reporting unusual activities or actions which are symptomatic of an attack. If these supposedly attacks are not checkmated, the aftermath on a system would be: (i) compromise of its integrity, (ii) denial of its availability and (iii) inefficiency.…”
Section: Introductionmentioning
confidence: 99%
“…These fields were selected based on the heuristic analysis of the data whereby they were found to be unique to the attack. So, with the assumption that all rules have full confidence factor, the formulated rules include: (2,14), (2,16), (3,15), (4,17), (5,13), (5,14), (6,15), (7,16), (7,17), (13,8), (14,9), (15,10), (16,11), (17,12)} 5) in = {σ 1 ,σ 2 σ 3 ,σ 4 σ 5 , σ 6 ,σ 7 } out = {σ 8 ,σ 9 σ 10 ,σ 11 σ 12 } Fig. 3.…”
Section: B Rules Formulation and Tfrsn P System's Modelmentioning
confidence: 99%