Applying Genetic Algorithm to Intrusion Detection System

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4

Abstract

" Now a days it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. With the rapid expansion of Internet in recent years; computer systems are facing increased number of security threats. Therefore, unwanted intrusions take place when the actual software systems are running. So Intrusion Detection Systems have become a needful component in terms of computer and network security. In this paper, we present an Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network attacks. Parameters and evolution processes for GA are discussed. Also impact on rate of GA operators in IDS for misuse is discussed. "

Authors and Affiliations

Keywords

Related Articles

Switching-Controllable of Operational Trance Resistance Amplifier (OTRA) based Bistable Multivibrators

Two bistable multivibrators based on the operational transresistance amplifier (OTRA) are presented. The first topology consists of only one OTRA and a positive feedback network. The second multivibrator utilizes a singl...

The Way of School Democratization through Topic Work

"The way of school democratizitation through topic work Dr. Shqipe Haxhihyseni (Shyti) Universiteti “A.Moisiu” Durrës Albania The research on this topic is a great achievement in the field of open education, considerin...

Latest Technologies in Surface Computing

Latest Technologies in Surface Computing

Initial Fault Detection by Using RAEED Protocol in Face Tracking Technique

One of the type of wireless sensor network is object tracking sensor network, which is used to track the object moving in the dedicated area. It reports the latest location of the object to base station. There is new f...

A Secure Account based Mobile Payment Protocol with Public Key Cryptography and Biometric Characteristics

A Secure Account based Mobile Payment Protocol with Public Key Cryptography and Biometric Characteristics

Download PDF file
  • EP ID EP363845
  • DOI -
  • Views 144
  • Downloads 0

How To Cite

(2015). Applying Genetic Algorithm to Intrusion Detection System. UNKNOWN, 4(4), -. https://europub.co.uk./articles/-A-363845