Skip to main content

An Efficient Hybrid Approach Using Misuse Detection and Genetic Algorithm for Network Intrusion Detection

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 905))

Included in the following conference series:

  • 1062 Accesses

Abstract

In today’s fast-changing Information Technology world, even the best available security is deficient for the latest vulnerabilities. In order to protect data and system integrity, Intrusion Detection is a preferred choice of researchers. In this paper, we have proposed a hybrid approach for intrusion detection that is based on misuse detection and genetic algorithm approach. Here, feature selection technique has been used for extracting important features and genetic algorithm is used for generating new rules. In this paper, we have detected ten different types of attacks that have high detection as well as low false positive rates.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Benaicha, S.E., Saoudi, L., Guermeche, S.E.B., Lounis, O.: Intrusion detection system using genetic algorithm. In: Science and Information Conference (SAI), pp. 564–568. IEEE (2014)

    Google Scholar 

  2. Jongsuebsuk, P., Wattanapongsakorn, N., Charnsripinyo, C.: Real time intrusion detection with fuzzy genetic algorithm. In: 10th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), pp. 1–6. IEEE (2013)

    Google Scholar 

  3. Wang, Y.: Using fuzzy expert system based on genetic algorithms for intrusion detection system. In: International Forum on Information Technology and Applications, IFITA 2009, vol. 2, pp. 221–224. IEEE (2009)

    Google Scholar 

  4. Bankovic, Z., Stepanovic, D., Bojanic, S., Taladriz, O.N.: Improving network security using genetic algorithm approach. Comput. Electr. Eng. 33(5), 438–451 (2007)

    Article  Google Scholar 

  5. Gong, R.H., Zulkernine, M., Abolmaesumi, P.: A software implementation of a genetic algorithm based approach to network intrusion detection. In: Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2005 and First ACIS International Workshop on Self-Assembling Wireless Networks. SNPD/SAWN 2005, pp. 246–253. IEEE (2005)

    Google Scholar 

  6. Khan, M.S.A.: Rule based network intrusion detection using genetic algorithm. Int. J. Comput. Appl. 18(8), 26–29 (2011)

    Google Scholar 

  7. Balajinath, B., Raghavan, S.V.: Intrusion detection through learning behavior model. Comput. Commun. 24(12), 1202–1212 (2001)

    Article  Google Scholar 

  8. Axelsson, S.: Intrusion detection systems: a survey and taxonomy, vol. 99. Technical report (2000)

    Google Scholar 

  9. Kumar, S.: Classification and detection of computer intrusions. Ph.D. thesis, Purdue University (1995)

    Google Scholar 

  10. Wei, L., Issa, T.: Detecting new forms of network intrusion using genetic programming. Comput. Intell. 20(3), 475–494 (2004)

    Article  MathSciNet  Google Scholar 

  11. Kumar, S., Spafford, E.H.: A software architecture to support misuse intrusion detection. Technical report CSD-TR- 95-009 (1995)

    Google Scholar 

  12. Holland, J.H.: Adaptation in Natural and Artificial Systems (1992)

    Google Scholar 

  13. Teodoro, G., Pedro, J.D.V., Fernandez, G.M., Vazquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1), 18–28 (2009)

    Article  Google Scholar 

  14. Pohlheim, H.: Genetic and evolutionary algorithms: principles, methods and algorithms (2006)

    Google Scholar 

  15. Hashemi, V.M., Muda, Z., Yassin, W.: Improving intrusion detection using genetic algorithm. Inf. Technol. J. 12(5), 2167–2173 (2013)

    Article  Google Scholar 

  16. Barani, F.: A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system. In: 2014 Iranian Conference on Intelligent Systems (ICIS), pp. 1–6. IEEE (2014)

    Google Scholar 

  17. Chang, N., He, Y., Huifang, L., Ren, H.: A study on GA-based WWN intrusion detection. In: International Conference on Management and Service Science, MASS 2009, pp. 1–4. IEEE (2009)

    Google Scholar 

  18. Padmadas, M., Krishna, N., Kanchana, J., Karthikeyan, M.:Layered approach for intrusion detection system based genetic algorithm. In: IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–4 (2013)

    Google Scholar 

  19. Senthilnayaki, B., Venkatalakshmi, K., Kannan, A.: An intelligent intrusion detection system using genetic based feature selection and modified J48 decision tree classifier. In: 2013 Fifth International Conference on Advanced Computing (ICoAC), pp. 1–7. IEEE (2013)

    Google Scholar 

  20. Fan, L.: Hybrid neural network intrusion detection system using genetic algorithm. In: 2010 International Conference on Multimedia Technology (ICMT), pp. 1–4. IEEE (2010)

    Google Scholar 

  21. Hoque, M.S., Mukit, B., Naser, A.: An implementation of intrusion detection system using genetic algorithm. arXiv preprint arXiv: 1204.1336 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanmeet Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rajpal, R., Kaur, S. (2018). An Efficient Hybrid Approach Using Misuse Detection and Genetic Algorithm for Network Intrusion Detection. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2018. Communications in Computer and Information Science, vol 905. Springer, Singapore. https://doi.org/10.1007/978-981-13-1810-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1810-8_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1809-2

  • Online ISBN: 978-981-13-1810-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics