Effect of Genetic Algorithm on Artificial Neural Network for Intrusion Detection System
Keywords:
Artificial Neural Network (ANN), Intrusion detection, Genetic algorithm (GA), Machine learning, Network SecurityAbstract
By increasing the advantages of network based systems and dependency of daily life with them, the efficient operation of network based systems is an essential issue. Since the number of attacks has significantly increased, intrusion detection systems of anomaly network behavior have increasingly attracted attention among research community. Intrusion detection systems have some capabilities such as adaptation, fault tolerance, high computational speed, and error resilience in the face of noisy information. So, construction of efficient intrusion detection model is highly required for increasing the detection rate as well as decreasing the false detection. . This paper investigates applying the following methods to detect the attacks intrusion detection system and understand the effective of GA on the ANN result: artificial Neural Network (ANN) for recognition and used Genetic Algorithm (GA) for optimization of ANN result. We use KDD CPU 99 dataset to obtain the results; witch shows the ANN result before the efficiency of GA and compare the result of ANN with GA optimization.
References
O. A. Soluade and E. U. Opara, "Security Breaches, Network Exploits and Vulnerabilities: A Conundrum and an Analysis."
H.-H. Gao, H.-H. Yang, and X.-Y. Wang, "Ant colony optimization based network intrusion feature selection and detection," in Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on, 2005, pp. 3871-3875.
Z. Y. M. Liu, "Intrusion Detection Systems," in Applied Mechanics and Materials, 2014, pp. 852-855.
A. Simmonds, P. Sandilands, and L. van Ekert, "An ontology for network security attacks," in Applied Computing, ed: Springer, 2004, pp. 317-323.
K. M. Shazzad and J. S. Park, "Optimization of intrusion detection through fast hybrid feature selection," in Parallel and Distributed Computing, Applications and Technologies, 2005. PDCAT 2005. Sixth International Conference on, 2005, pp. 264-267.
C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin, "Intrusion detection by machine learning: A review," Expert Systems with Applications, vol. 36, pp. 11994-12000, 2009.
A. Tamilarasan, S. Mukkamala, A. H. Sung, and K. Yendrapalli, "Feature ranking and selection for intrusion detection using artificial neural networks and statistical methods," in Neural Networks, 2006. IJCNN'06. International Joint Conference on, 2006, pp. 4754-4761.
V. T. Goh, J. Zimmermann, and M. Looi, "Towards intrusion detection for encrypted networks," in Availability, Reliability and Security, 2009. ARES'09. International Conference on, 2009, pp. 540-545.
R. Ma, "Neural Networks for Intrusion Detection," 2009.
A. Dastanpour, S. Ibrahim, R. Mashinchi, and A. Selamat, "Comparison of genetic algorithm optimization on artificial neural network and support vector machine in intrusion detection system," in Open Systems (ICOS), 2014 IEEE Conference on, 2014, pp. 72-77.
O. Linda, T. Vollmer, and M. Manic, "Neural network based intrusion detection system for critical infrastructures," in Neural Networks, 2009. IJCNN 2009. International Joint Conference on, 2009, pp. 1827-1834.
G. P. a. N. Mishra, "Optimal Feature Selection in Stream Data Classification Using Improved Ensemble Classifier for High Dimension Data," International Journal of Computer Sciences and Engineering, vol. 04, pp. 12-18, Sep -2016.
M. S. Hoque, M. Mukit, M. Bikas, and A. Naser, "An implementation of intrusion detection system using genetic algorithm," arXiv preprint arXiv:1204.1336, 2012.
M. H. Mashinchi, M. R. Mashinchi, and S. M. H. Shamsuddin, "A Genetic Algorithm Approach for Solving Fuzzy Linear and Quadratic Equations," World Academy of Science, Engineering and Technology, vol. 28, 2007.
P. Gupta and S. K. Shinde, "Genetic Algorithm Technique Used to Detect Intrusion Detection," in Advances in Computing and Information Technology, ed: Springer, 2011, pp. 122-131.
V. K. Kshirsagar, S. M. Tidke, and S. Vishnu, "Intrusion Detection System using Genetic Algorithm and Data Mining: An Overview," International Journal of Computer Science and Informatics ISSN (PRINT), pp. 2231-5292, 2012.
C.-H. Tsang, S. Kwong, and H. Wang, "Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection," Pattern Recognition, vol. 40, pp. 2373-2391, 2007.
Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai, and K. Dai, "An efficient intrusion detection system based on support vector machines and gradually feature removal method," Expert Systems with Applications, vol. 39, pp. 424-430, 2012.
F. Amiri, M. Rezaei Yousefi, C. Lucas, A. Shakery, and N. Yazdani, "Mutual information-based feature selection for intrusion detection systems," Journal of Network and Computer Applications, vol. 34, pp. 1184-1199, 2011.
A. Abraham, R. Jain, J. Thomas, and S. Y. Han, "D-SCIDS: Distributed soft computing intrusion detection system," Journal of Network and Computer Applications, vol. 30, pp. 81-98, 2007.
A. Dastanpour and R. A. R. Mahmood, "Feature selection based on genetic algorithm and SupportVector machine for intrusion detection system," in The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013), 2013, pp. 169-181.
X. Sun, Y. Liu, J. Li, J. Zhu, H. Chen, and X. Liu, "Feature evaluation and selection with cooperative game theory," Pattern recognition, vol. 45, pp. 2992-3002, 2012.
B. Luo and J. Xia, "A novel intrusion detection system based on feature generation with visualization strategy," Expert Systems with Applications, vol. 41, pp. 4139-4147, 2014.
Y. Chen, B. Yang, and A. Abraham, "Flexible neural trees ensemble for stock index modeling," Neurocomputing, vol. 70, pp. 697-703, 2007.
M. K. Siddiqui and S. Naahid, "Analysis of KDD CUP 99 Dataset using Clustering based Data Mining," International Journal of Database Theory & Application, vol. 6, 2013.
G. Carl, G. Kesidis, R. R. Brooks, and S. Rai, "Denial-of-service attack-detection techniques," Internet Computing, IEEE, vol. 10, pp. 82-89, 2006.
M. Sabhnani and G. Serpen, "KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection," in Security and Management, 2003, pp. 310-316.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
