Open Access   Article Go Back

Classification of Attack for IDS Using Binary Genetic Algorithm Based Feature Selection

S. Rani1

  1. Department of Computer Science and Application, Kurukshetra University, Kurukshetra, Haryana, India.
  2. Department of Computer Science and Application, Kurukshetra University, Kurukshetra, Haryana, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 203-208, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.203208

Online published on May 31, 2018

Copyright © S. Rani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Rani, “Classification of Attack for IDS Using Binary Genetic Algorithm Based Feature Selection,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.203-208, 2018.

MLA Style Citation: S. Rani "Classification of Attack for IDS Using Binary Genetic Algorithm Based Feature Selection." International Journal of Computer Sciences and Engineering 6.5 (2018): 203-208.

APA Style Citation: S. Rani, (2018). Classification of Attack for IDS Using Binary Genetic Algorithm Based Feature Selection. International Journal of Computer Sciences and Engineering, 6(5), 203-208.

BibTex Style Citation:
@article{Rani_2018,
author = {S. Rani},
title = {Classification of Attack for IDS Using Binary Genetic Algorithm Based Feature Selection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {203-208},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1963},
doi = {https://doi.org/10.26438/ijcse/v6i5.203208}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.203208}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1963
TI - Classification of Attack for IDS Using Binary Genetic Algorithm Based Feature Selection
T2 - International Journal of Computer Sciences and Engineering
AU - S. Rani
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 203-208
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
595 395 downloads 202 downloads
  
  
           

Abstract

IDS is used to detect any kinds of attacks that may harm the safety of systems. A capable IDS system needs low FAR, and high accuracy. In this paper, we have used fully distinct DM approaches on IDS with the KDD data set. Here the BGA which offers a new method used for fixing normal & DOS.

Key-Words / Index Term

Intrusion Detection System, Binary Genetic Algorithm(BGA), Classifiers, Anomaly Detection

References

[1] R. Kaur and M. Bansal, "Multidimensional attacks classification based on genetic algorithm and SVM," 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, 2016, pp. 561-565.
[2] R. Samrin and D. Vasumathi, "Review on anomaly based network intrusion detection system," 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), pp. 141-147
[3] A. R. Jakhale, "Design of anomaly packet detection framework by data mining algorithm for network flow," 2017 International Conference on Computational Intelligence in Data Science (ICC IDS), Chennai, 2017, pp. 1-6.
[4] A. Sultana, and M.A. Jabbar, “Intelligent network intrusion detection system using data mining techniques,” In the Proceedings of 2ndInternational Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp. 329-333, 2016.
[5] H. Om and A. Kundu, "A hybrid system for reducing the false alarm rate of anomaly intrusion detection system," 2012 1st International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, 2012, pp. 131-136.
[6] L. Li, D. Z. Yang and F. C. Shen,” A novel rule-based Intrusion Detection System using data mining", Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on. Vol. 6. IEEE, pp. 169-172, July 2010.
[7] K. Goeschel,” Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector 2016 2nd International Conference on Next Generation Computing Technologies (NGCT-2016) Dehradun, India 14-16 October 2016 564 machines, decision trees, and naive Bayes for off-line analysis", SoutheastCon 2016 IEEE, pp. 1-6, Mar 2016
[8] N. Shahadat, I. Hossain, A. Rohman and N. Matin, "Experimental analysis of data mining application for intrusion detection with feature reduction," 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox`s Bazar, 2017, pp. 209-216.
[9] I. S. Thaseen and C. A. Kumar, "Intrusion detection model using a fusion of PCA and optimized SVM," 2014 International Conference on Contemporary Computing and Informatics (IC3I), Mysore, 2014, pp. 879-884.
[10] W. Lee and S. J. Stolfo. “Datamining approaches for intrusion detection,” In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998.
[11] http://kdd.ics.uci.edu/databases/kddcup99/task.html

[12] M. Ektefa, S. Memar, F. Sidi and L. S. Affendey, "Intrusion detection using data mining techniques," 2010 International Conference on Information Retrieval & Knowledge Management (CAMP), Shah Alam, Selangor, 2010, pp. 200-203
[13] D.Srivastava, L.Bhambu.Data Classification using support vector machine.Journal of Theoretical Applied Information Technology, Vol.12 (1), pp.1-7, 2010.