Skip to main content

Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems

  • Conference paper
Advances in Computer Science and Information Technology. Networks and Communications (CCSIT 2012)

Abstract

Intrusion Detection System (IDS) can handle intrusions in computer environments by triggering alerts to help the analysts for taking actions to stop the possible attack or intrusion. But, the IDS make the job of analyst more difficult by triggering thousands of alerts for any suspicious activity. In this paper, an anomaly based network intrusion detection system using a genetic algorithm approach is adopted. The proposed method is efficient with respect to good detection rate with low false positives. The experimental results demonstrate the lower execution time of the proposed algorithm GANIDS (Genetic Algorithms based Network Intrusion Detection System) when compared with PAYL [1]. The proposed payload based IDS uses an adaptive genetic algorithm for both learning and detection. The proposed GANIDS is benchmarked with PAYL [1] using the 1999 DARPA IDS dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, K., Stolfo, S.J.: Anomalous Payload-Based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203–222. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Bolzoni, D., Etalle, S., Hartel, P.: POSEIDON: a 2-tier anomaly-based network intrusion detection system. In: Fourth IEEE International Workshop on In Information Assurance, IWIA 2006 (2006)

    Google Scholar 

  3. Zhang, L.-H., et al.: Intrusion detection using rough set classification. Journal of Zhejiang University Science 5(9), 1076–1086 (2004)

    Article  Google Scholar 

  4. Zhao, J.-L., Zhao, J.-F., Li, J.-J.: Intrusion Detection Based On Clustering Genetic Algorithm. In: Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, August 18-21 (2005)

    Google Scholar 

  5. Lunt, T.: Detecting intruders in computer systems. In: Proceedings of Auditing and Computer Technology Conference, pp. 23–30 (1999)

    Google Scholar 

  6. Ryan, J., Lin, M., Miikkulainen, R.: Intrusion detection with neural networks. In: Advances in Neural Information Processing Systems, vol. 10. MIT Press (1998)

    Google Scholar 

  7. Crosbie, M.: Applying genetic programming to intrusion detection. In: Proceedings of AAAI Fall Symposium Series, pp. 45–52 (1995)

    Google Scholar 

  8. Gomez, J., Dasgupta, D., Nasraoui, O.: Complete expression trees for evolving fuzzy classifiers systems with genetic algorithms and application to network intrusion detection. In: Proceedings of the NAFIPS-FLINT Joint Conference, pp. 469–474 (2002)

    Google Scholar 

  9. Heady, R., Luger, G., Maccabe, A., Servilla, M.: The architecture of network level intrusion detection system, Technical Report, Department of Computer Science, University of New Mexico (1990)

    Google Scholar 

  10. Ozyer, T., Alhaji, R., Barker, K.: Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule prescreening. Journal of Network and Computer Applications, 99–113 (2007)

    Google Scholar 

  11. Crosbie, M., Spafford, E.: Applying genetic Programming to Intrusion Detection. In: Proceedings of the AAAI Fall Symposium (1995)

    Google Scholar 

  12. Toosi, N., Kahani, M.: A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Computer Communications 30, 2201–2212 (2007)

    Article  Google Scholar 

  13. Vokorokos, L., Balaz, A.: Host-based intrusion detection system, Technical University of Koaice, Department of Computers and Informatics, Slovak Republic (2010)

    Google Scholar 

  14. Depren, O., Topallar, M., Anarim, E., Kemal Ciliz, M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Bogazici University, Electrical and Electronics Engineering Department, Information and Communications Security (BUICS) Lab, Bebek, Istanbul, Turkey (2007)

    Google Scholar 

  15. Li, W.: Using Genetic algorithms for Intrusion Detection System, Department of Computer Science and Engineering Mississippi State University, Mississippi State (2004)

    Google Scholar 

  16. Ryan, J., Lin, M.-J., Miikkulainen, R.: Intrusion Detection with Neural networks. The University of Texas, Austin (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Srinivasa, K.G. (2012). Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Networks and Communications. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27299-8_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27299-8_61

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27298-1

  • Online ISBN: 978-3-642-27299-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics