Abstract
Intrusion Detection System (IDS) can handle intrusions in computer environments by triggering alerts to help the analysts for taking actions to stop the possible attack or intrusion. But, the IDS make the job of analyst more difficult by triggering thousands of alerts for any suspicious activity. In this paper, an anomaly based network intrusion detection system using a genetic algorithm approach is adopted. The proposed method is efficient with respect to good detection rate with low false positives. The experimental results demonstrate the lower execution time of the proposed algorithm GANIDS (Genetic Algorithms based Network Intrusion Detection System) when compared with PAYL [1]. The proposed payload based IDS uses an adaptive genetic algorithm for both learning and detection. The proposed GANIDS is benchmarked with PAYL [1] using the 1999 DARPA IDS dataset.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wang, K., Stolfo, S.J.: Anomalous Payload-Based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203–222. Springer, Heidelberg (2004)
Bolzoni, D., Etalle, S., Hartel, P.: POSEIDON: a 2-tier anomaly-based network intrusion detection system. In: Fourth IEEE International Workshop on In Information Assurance, IWIA 2006 (2006)
Zhang, L.-H., et al.: Intrusion detection using rough set classification. Journal of Zhejiang University Science 5(9), 1076–1086 (2004)
Zhao, J.-L., Zhao, J.-F., Li, J.-J.: Intrusion Detection Based On Clustering Genetic Algorithm. In: Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, August 18-21 (2005)
Lunt, T.: Detecting intruders in computer systems. In: Proceedings of Auditing and Computer Technology Conference, pp. 23–30 (1999)
Ryan, J., Lin, M., Miikkulainen, R.: Intrusion detection with neural networks. In: Advances in Neural Information Processing Systems, vol. 10. MIT Press (1998)
Crosbie, M.: Applying genetic programming to intrusion detection. In: Proceedings of AAAI Fall Symposium Series, pp. 45–52 (1995)
Gomez, J., Dasgupta, D., Nasraoui, O.: Complete expression trees for evolving fuzzy classifiers systems with genetic algorithms and application to network intrusion detection. In: Proceedings of the NAFIPS-FLINT Joint Conference, pp. 469–474 (2002)
Heady, R., Luger, G., Maccabe, A., Servilla, M.: The architecture of network level intrusion detection system, Technical Report, Department of Computer Science, University of New Mexico (1990)
Ozyer, T., Alhaji, R., Barker, K.: Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule prescreening. Journal of Network and Computer Applications, 99–113 (2007)
Crosbie, M., Spafford, E.: Applying genetic Programming to Intrusion Detection. In: Proceedings of the AAAI Fall Symposium (1995)
Toosi, N., Kahani, M.: A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Computer Communications 30, 2201–2212 (2007)
Vokorokos, L., Balaz, A.: Host-based intrusion detection system, Technical University of Koaice, Department of Computers and Informatics, Slovak Republic (2010)
Depren, O., Topallar, M., Anarim, E., Kemal Ciliz, M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Bogazici University, Electrical and Electronics Engineering Department, Information and Communications Security (BUICS) Lab, Bebek, Istanbul, Turkey (2007)
Li, W.: Using Genetic algorithms for Intrusion Detection System, Department of Computer Science and Engineering Mississippi State University, Mississippi State (2004)
Ryan, J., Lin, M.-J., Miikkulainen, R.: Intrusion Detection with Neural networks. The University of Texas, Austin (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Srinivasa, K.G. (2012). Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Networks and Communications. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27299-8_61
Download citation
DOI: https://doi.org/10.1007/978-3-642-27299-8_61
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27298-1
Online ISBN: 978-3-642-27299-8
eBook Packages: Computer ScienceComputer Science (R0)