2020
DOI: 10.11591/ijeecs.v17.i2.pp1059-1065
|View full text |Cite
|
Sign up to set email alerts
|

Network intrusion detection system using immune-genetic algorithm (IGA)

Abstract: Network security is an important aspect in maintaining computer network systems and personal information from being illegally accessed by third parties. The major problem that frequently occurs in computer network systems is the failure in detecting possible network-attacks. Apart from that, the process of recognizing the type of attack that occurs is very crucial as it will determine the elimination process that should take place to counter the intrusion. This paper proposes the application of standard Geneti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…After obtaining the output data of NSE, the GA_BP algorithm is utilized to construct the evaluation model. In the process of constructing the model, the GA will correspond to the connection weights and the network structure in the neural network, so that it can overcome the problems in the BP algorithm and significantly improve the data generalization ability [19][20]. The study takes the data vulnerabilities and risks in network security as inputs to the model, and utilizes the global search capability of the GA to search for the data vulnerabilities that exist.…”
Section: B Network Security Evaluation Model Construction Based On Ga_bpmentioning
confidence: 99%
“…After obtaining the output data of NSE, the GA_BP algorithm is utilized to construct the evaluation model. In the process of constructing the model, the GA will correspond to the connection weights and the network structure in the neural network, so that it can overcome the problems in the BP algorithm and significantly improve the data generalization ability [19][20]. The study takes the data vulnerabilities and risks in network security as inputs to the model, and utilizes the global search capability of the GA to search for the data vulnerabilities that exist.…”
Section: B Network Security Evaluation Model Construction Based On Ga_bpmentioning
confidence: 99%
“…The CIC-IDS 2017 and KDD Cup 99 data sets were used to test their proposed method. Novel utilization of Genetic Algorithm (GA) alongside an immune algorithm was proposed in [47] to improve a computer's ability to detect intrusion. They carried out several simulations to verify the performance of their proposed method.…”
Section: Related Workmentioning
confidence: 99%
“…In literature, we understood that using different machine learning techniques, a number of intrusion detection systems are developed. For instance, some research studies apply single learning techniques, such as self-organizing map [22], neural networks [23], genetic algorithms [24], decision tree [25,26], and pattern matching algorithms [27] to develop intrusion detection model. On the other hand, some intrusion detection systems such as hybrid approach or ensemble techniques are [28] developed by combining different machine learning techniques and ensemble classifiers by combining multiple weak learners [29].…”
Section: Related Workmentioning
confidence: 99%