A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection

Arpitha J, Nagaraj Naik

This paper proposes a new approach to design the system using a hybrid of misuse and anomaly detection for training of normal and attack packets respectively. The hybrid intrusion detection system combines the K-means and the genetic algorithm for anomaly detection. This algorithm operates on the KDD-99 Data set, this data set is used worldwide for evaluating the performance of different intrusion detection systems. The system can detect the intrusions and further classify them into four categories Denial of Service (DoS), U2R (User to Root), R2L (Remote to Local), and probe. The main goal is to reduce the false alarm rate of IDS.

Keywords: Clustering, Classification, K-Means, Genetic Algorithm, Detection rate, False alarm rate, Intrusion detection, data mining, KDD cup 99

Edition: Volume 4 Issue 4, April 2015

Pages: 3054 - 3057

Share this Article

How to Cite this Article?

Arpitha J, Nagaraj Naik, "A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153890, Volume 4 Issue 4, April 2015, 3054 - 3057

97 PDF Views | 82 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Clustering'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patients DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2253 - 2256

Survey on Hubness - Based Clustering Algorithms

Nikita Dhamal, Antara Bhatttacharya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2275 - 2278

Data Collection from Clusters in Wireless Sensor Network with Help of Mobile Nodes

Suraj Borge, Mayura Kinikar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1742 - 1745

Enhancement of Leach Protocol in Wireless Sensor Network

Bipin Patel, Hardik Kadiya

Share this Article

Research Paper, Computer Science & Engineering, Egypt, Volume 3 Issue 11, November 2014

Pages: 1128 - 1132

Keyword Extraction using Clustering and Semantic Analysis

Dr. Mohamed H. Haggag, Dr.Amal Abutabl, Ahmed Basil

Share this Article

Similar Articles with Keyword 'Classification'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1615 - 1620

Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm

Premsai Cheedella

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patients DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1869 - 1872

A Technique to Combine Feature Selection with Instance Selection for Effective Bug Triage

Suvarna Kale, Ajay Kumar Gupta

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1888 - 1890

Spammer Detection and Identification on Social Network Using Machine Learning

Dr. Shameem Akhter, Noorain Saba

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3173 - 3178

An Overview of Pattern Recognition Applications and Its Approaches: A Review

Rajleen Kaur

Share this Article

Similar Articles with Keyword 'K-Means'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2790 - 2794

Risk Distribution and Validation of Data in Passport Data Analysis Using Cluster Analysis

Sucheta Gulia, Dr. Rajan Vohra

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2374 - 2376

A Survey of Novel Clustering and Knowledge Extraction from Log

Vasim Dilawar Mujawar, Prof. Pratima Bhati

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1164 - 1169

A Survey on Scalable Big Data Analytics Platform

Ravindra Phule, Madhav Ingle

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1440 - 1443

Automated Annotation System (AAS) Based on Probabilistic Clustering Algorithms

Silja Joy, Nisha J R

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1634 - 1638

Performance Comparison of Hard and Fuzzy Clustering Algorithms on ESTs of Human Genes

Abhilasha Chaudhuri, Asha Ambhaikar

Share this Article

Similar Articles with Keyword 'Genetic Algorithm'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1334 - 1337

Mutation Testing Techniques in Software Testing: A Review

Dushyant Singh, Parulpreet Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2275 - 2278

Data Collection from Clusters in Wireless Sensor Network with Help of Mobile Nodes

Suraj Borge, Mayura Kinikar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 681 - 686

An Evolving Approach on Efficient Web Crawler using Fuzzy Genetic Algorithm

P. Jaganathan, T. Karthikeyan

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1593 - 1596

Review on Heart Disease Diagnosis Based on Data Mining Techniques

Punam Bajaj, Preeti Gupta

Share this Article

Similar Articles with Keyword 'Detection rate'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2309 - 2312

Email Spam Detection Framework with underlined Coefficient Equality Technique

Harikrishna K, Y Siva Prasad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Similar Articles with Keyword 'False alarm rate'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1612 - 1617

Intrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning Algorithms

Amol S. Jadhav, Dhanashree Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3054 - 3057

A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection

Arpitha J, Nagaraj Naik

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1138 - 1140

Finding Anomaly with Fuzzy Rough C-Means Using Semi-Supervised Approach

Gadekar S. S., Prof. Shinde S. M.

Share this Article

Similar Articles with Keyword 'Intrusion detection'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1758 - 1764

Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network

T. Sankar, M. Prakash

Share this Article

Similar Articles with Keyword 'data mining'

Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018

Pages: 1409 - 1411

Students Performance Prediction Using FP-Tree Data Mining Techniques

Eliakim Ombati Akama

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2041 - 2047

Adaptive Analysis of Knowledge Engineering and Pattern Recognition on Medical Data

Jani Basha, Dasari. Rajesh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2790 - 2794

Risk Distribution and Validation of Data in Passport Data Analysis Using Cluster Analysis

Sucheta Gulia, Dr. Rajan Vohra

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 708 - 710

A Review on Efficient Algorithms for Mining High Utility Item Sets

Nutan Sarode, Devendra Gadekar

Share this Article

Similar Articles with Keyword 'KDD cup 99'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3054 - 3057

A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection

Arpitha J, Nagaraj Naik

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Research Paper, Computer Science & Engineering, Sudan, Volume 6 Issue 9, September 2017

Pages: 337 - 342

Intrusion Detection System Using Weka Data Mining Tool

Asma Abbas Hassan, Alaa F. Sheta, Talaat M. Wahbi

Share this Article
Top