Classification of Attack for IDS Using Binary Genetic Algorithm Based Feature Selection

Authors

  • Rani S Department of Computer Science and Application, Kurukshetra University, Kurukshetra, Haryana, India

DOI:

https://doi.org/10.26438/ijcse/v6i5.203208

Keywords:

Intrusion Detection System, Binary Genetic Algorithm(BGA), Classifiers, Anomaly Detection

Abstract

IDS is used to detect any kinds of attacks that may harm the safety of systems. A capable IDS system needs low FAR, and high accuracy. In this paper, we have used fully distinct DM approaches on IDS with the KDD data set. Here the BGA which offers a new method used for fixing normal & DOS.

References

R. Kaur and M. Bansal, "Multidimensional attacks classification based on genetic algorithm and SVM," 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, 2016, pp. 561-565.

R. Samrin and D. Vasumathi, "Review on anomaly based network intrusion detection system," 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), pp. 141-147

A. R. Jakhale, "Design of anomaly packet detection framework by data mining algorithm for network flow," 2017 International Conference on Computational Intelligence in Data Science (ICC IDS), Chennai, 2017, pp. 1-6.

A. Sultana, and M.A. Jabbar, “Intelligent network intrusion detection system using data mining techniques,” In the Proceedings of 2ndInternational Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp. 329-333, 2016.

H. Om and A. Kundu, "A hybrid system for reducing the false alarm rate of anomaly intrusion detection system," 2012 1st International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, 2012, pp. 131-136.

L. Li, D. Z. Yang and F. C. Shen,” A novel rule-based Intrusion Detection System using data mining", Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on. Vol. 6. IEEE, pp. 169-172, July 2010.

K. Goeschel,” Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector 2016 2nd International Conference on Next Generation Computing Technologies (NGCT-2016) Dehradun, India 14-16 October 2016 564 machines, decision trees, and naive Bayes for off-line analysis", SoutheastCon 2016 IEEE, pp. 1-6, Mar 2016

N. Shahadat, I. Hossain, A. Rohman and N. Matin, "Experimental analysis of data mining application for intrusion detection with feature reduction," 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox's Bazar, 2017, pp. 209-216.

I. S. Thaseen and C. A. Kumar, "Intrusion detection model using a fusion of PCA and optimized SVM," 2014 International Conference on Contemporary Computing and Informatics (IC3I), Mysore, 2014, pp. 879-884.

W. Lee and S. J. Stolfo. “Datamining approaches for intrusion detection,” In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998.

http://kdd.ics.uci.edu/databases/kddcup99/task.html

M. Ektefa, S. Memar, F. Sidi and L. S. Affendey, "Intrusion detection using data mining techniques," 2010 International Conference on Information Retrieval & Knowledge Management (CAMP), Shah Alam, Selangor, 2010, pp. 200-203

D.Srivastava, L.Bhambu.Data Classification using support vector machine.Journal of Theoretical Applied Information Technology, Vol.12 (1), pp.1-7, 2010.

Downloads

Published

2025-11-13
CITATION
DOI: 10.26438/ijcse/v6i5.203208
Published: 2025-11-13

How to Cite

[1]
S. Rani, “Classification of Attack for IDS Using Binary Genetic Algorithm Based Feature Selection”, Int. J. Comp. Sci. Eng., vol. 6, no. 5, pp. 203–208, Nov. 2025.

Issue

Section

Research Article