Document Type : Review Article

Author

Dr.

Abstract

There has been a rapid growth in the numbers of attacks to the information and communication systems. Also, we witness smarter behaviors from the attackers. Thus, to prevent our systems from these attackers, we need to create smarter intrusion detection systems. In this paper, a new intelligent intrusion detection system has been proposed using genetic algorithms. In this system, at first, the network connection features were ranked according to their importance in detecting attack using information theory measures. Then, the network traffic linear classifiers based on genetic algorithms have been designed. These classifiers were trained and tested using KDD99 data sets. A detection engine based on these classifiers was build and experimented. The experimental results showed a detection rate up till to 92.94%. This engine can be used in real-time mode.

Keywords

[1] Papoulis and Pillai S.U.; Probability, Random Variables and Stochastic Processes, book, (2002)
[2] Wei Li; Using Genetic Algorithm for Network Intrusion Detection, SANS Institute, USA, (2004)
[3] Melanie M.; An Introduction to Genetic Algorithms, Cambridge, Massachusetts London, England, Fifth printing, (1999)
[4] Hartmut P.; Genetic and Evolutionary Algorithms: Principles, Methods and Algorithms Genetic and Evolutionary Algorithm Toolbox. Hartmut Pohlheim, (2003)
[5] Middlemiss M.J. and Dick G.; “Weighted Feature Extraction Using a Genetic Algorithm for Intrusion Detection”, Evolutionary Computation,Vol. 3 pp. 1699 - 1675, (2003)
[6] Qu X., Hariri S. and Yousif M.; “An Efficient Network Intrusion Detection Method Based on Information Theory and Genetic Algorithm”, Proceedings of the 24th IEEE International Performance Computing and Communications, (2005)
[7] Chittur; “Model Generation for an Intrusion Detection System Using Genetic Algorithms”, http://www1.cs.columbia.edu/ids/publications/gaids-paper01.pdf, (2005)
[8] Lu W. and Traore I.; “Detecting New Forms of Network Intrusion Using Genetic Programming”, Computational Intelligence, Vol. 20, pp. 3, Blackwell Publishing, Malden, pp. 475 - 494, (2004)
[9] Jim G., Da-xin L. and in-ge C.; “An Induction Learning Approach for Building Intrusion Detection Models Using Genetic Algorithms” , Proceedings of the 5Ih World Congress on Intelligent Control and Automation, (June 15 - 19 2004)
[10] http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html
[11] Tsang, S. Kwong and Wang H.; Anomaly Intrusion Detection using Multi-Objective Genetic Fuzzy System and Agent-based Evolutionary Computation Framework, Proceedings of the Fifth IEEE International Conference on Data Mining, (2005)
[12] Levin; “KDD-99 Classifier Learning Contest LLSoft's Results”, Overview. SIGKDD Explorations. ACMSIGKDD, Vol. 1, No. 2, pp. 67 – 75, (2000)
[13] Song, Heywood M.1. and Zincir-Heywood A.N.; “Training Genetic Programming on Half a Million Patterns: An Example from Anomaly Detection”, IEEE Transactions on Evolutionary Computation, Vol. 9, No. 3, (2005)
[14] Agarwal R.and Joshi. M.V.; “Pnrule: A New Framework for Learning Classifier Models in Data Mining”, Department of Computer Science, University of Minnesota, Report No. RC-21719, (2000)
[15] Elkan; Results of the Kdd’99 Classifier Learning, ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, Boston, MA, Vol. 1, No. 2, (2000)