Classification of Attack for IDS Using Binary Genetic Algorithm Based Feature Selection
DOI:
https://doi.org/10.26438/ijcse/v6i5.203208Keywords:
Intrusion Detection System, Binary Genetic Algorithm(BGA), Classifiers, Anomaly DetectionAbstract
IDS is used to detect any kinds of attacks that may harm the safety of systems. A capable IDS system needs low FAR, and high accuracy. In this paper, we have used fully distinct DM approaches on IDS with the KDD data set. Here the BGA which offers a new method used for fixing normal & DOS.
References
R. Kaur and M. Bansal, "Multidimensional attacks classification based on genetic algorithm and SVM," 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, 2016, pp. 561-565.
R. Samrin and D. Vasumathi, "Review on anomaly based network intrusion detection system," 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), pp. 141-147
A. R. Jakhale, "Design of anomaly packet detection framework by data mining algorithm for network flow," 2017 International Conference on Computational Intelligence in Data Science (ICC IDS), Chennai, 2017, pp. 1-6.
A. Sultana, and M.A. Jabbar, “Intelligent network intrusion detection system using data mining techniques,” In the Proceedings of 2ndInternational Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp. 329-333, 2016.
H. Om and A. Kundu, "A hybrid system for reducing the false alarm rate of anomaly intrusion detection system," 2012 1st International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, 2012, pp. 131-136.
L. Li, D. Z. Yang and F. C. Shen,” A novel rule-based Intrusion Detection System using data mining", Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on. Vol. 6. IEEE, pp. 169-172, July 2010.
K. Goeschel,” Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector 2016 2nd International Conference on Next Generation Computing Technologies (NGCT-2016) Dehradun, India 14-16 October 2016 564 machines, decision trees, and naive Bayes for off-line analysis", SoutheastCon 2016 IEEE, pp. 1-6, Mar 2016
N. Shahadat, I. Hossain, A. Rohman and N. Matin, "Experimental analysis of data mining application for intrusion detection with feature reduction," 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox's Bazar, 2017, pp. 209-216.
I. S. Thaseen and C. A. Kumar, "Intrusion detection model using a fusion of PCA and optimized SVM," 2014 International Conference on Contemporary Computing and Informatics (IC3I), Mysore, 2014, pp. 879-884.
W. Lee and S. J. Stolfo. “Datamining approaches for intrusion detection,” In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998.
http://kdd.ics.uci.edu/databases/kddcup99/task.html
M. Ektefa, S. Memar, F. Sidi and L. S. Affendey, "Intrusion detection using data mining techniques," 2010 International Conference on Information Retrieval & Knowledge Management (CAMP), Shah Alam, Selangor, 2010, pp. 200-203
D.Srivastava, L.Bhambu.Data Classification using support vector machine.Journal of Theoretical Applied Information Technology, Vol.12 (1), pp.1-7, 2010.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
