2019
DOI: 10.11591/ijeecs.v16.i3.pp1593-1599
|View full text |Cite
|
Sign up to set email alerts
|

Network intrusion detection system by using genetic algorithm

Abstract: Developing a better intrusion detection systems (IDS) has attracted many researchers in the area of computer network for the past decades. In this paper, Genetic Algorithm (GA) is proposed as a tool that capable to identify harmful type of connections in a computer network. Different features of connection data such as duration and types of connection in network were analyzed to generate a set of classification rule. For this project, standard benchmark dataset known as KDD Cup 99 was investigated and utilized… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 23 publications
0
10
0
Order By: Relevance
“…For simplicity, the minimum and maximum value of noise can be set to 0 and 1 assuming that noise level becomes 0 when bats stop emitting sound (because the bats have already found their prey). This activity can be modeled by the mathematical representation in (10) and 11…”
Section: Pi Controllermentioning
confidence: 99%
See 2 more Smart Citations
“…For simplicity, the minimum and maximum value of noise can be set to 0 and 1 assuming that noise level becomes 0 when bats stop emitting sound (because the bats have already found their prey). This activity can be modeled by the mathematical representation in (10) and 11…”
Section: Pi Controllermentioning
confidence: 99%
“…Pulse emission and a constant value in (10) and (11) are presented as ri, α and γ. For every 0< α <1 and γ>0, the mathematical representation can be described in (12).…”
Section: Pi Controllermentioning
confidence: 99%
See 1 more Smart Citation
“…Parallel RGSOM-CRV method outperformed the regular GSOM, as it reached up to 91.86% ACC, 20.58% FAR, 95.32% DTR or Recall, and Precision up to 94.35%. The authors of paper [12] proposed a genetic algorithm (GA) as a tool that able to identify harmful types of connections in a computer network, as it analyzed features of connection data and types of connection in the network to generate a set of classification rules. The proposed method uses the combination of genetic operators which are cloning, crossover, and mutation processes to generate new chromosomes.…”
Section: Introductionmentioning
confidence: 99%
“…Many pieces of research [14] show that many existing prevention mechanisms are not sufficient to secure the data packets of the network and maintain the service of WSN [15]. They also cannot prevent the network from all the attacks experienced by them.…”
Section: Introductionmentioning
confidence: 99%