Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015
A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection
Arpitha J, Nagaraj Naik
This paper proposes a new approach to design the system using a hybrid of misuse and anomaly detection for training of normal and attack packets respectively. The hybrid intrusion detection system combines the K-means and the genetic algorithm for anomaly detection. This algorithm operates on the KDD-99 Data set, this data set is used worldwide for evaluating the performance of different intrusion detection systems. The system can detect the intrusions and further classify them into four categories Denial of Service (DoS), U2R (User to Root), R2L (Remote to Local), and probe. The main goal is to reduce the false alarm rate of IDS.
Keywords: Clustering, Classification, K-Means, Genetic Algorithm, Detection rate, False alarm rate, Intrusion detection, data mining, KDD cup 99
Edition: Volume 4 Issue 4, April 2015
Pages: 3054 - 3057
How to Cite this Article?
Arpitha J, Nagaraj Naik, "A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153890, Volume 4 Issue 4, April 2015, 3054 - 3057
97 PDF Views | 82 PDF Downloads
Similar Articles with Keyword 'Clustering'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1936 - 1938A Mining Method to Predict Patients DOSH
Ruchi Rathor, Pankaj Agarkar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2253 - 2256Survey on Hubness - Based Clustering Algorithms
Nikita Dhamal, Antara Bhatttacharya
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2275 - 2278Data Collection from Clusters in Wireless Sensor Network with Help of Mobile Nodes
Suraj Borge, Mayura Kinikar
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1742 - 1745Enhancement of Leach Protocol in Wireless Sensor Network
Bipin Patel, Hardik Kadiya
Research Paper, Computer Science & Engineering, Egypt, Volume 3 Issue 11, November 2014
Pages: 1128 - 1132Keyword Extraction using Clustering and Semantic Analysis
Dr. Mohamed H. Haggag, Dr.Amal Abutabl, Ahmed Basil
Similar Articles with Keyword 'Classification'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1615 - 1620Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm
Premsai Cheedella
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1936 - 1938A Mining Method to Predict Patients DOSH
Ruchi Rathor, Pankaj Agarkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1869 - 1872A Technique to Combine Feature Selection with Instance Selection for Effective Bug Triage
Suvarna Kale, Ajay Kumar Gupta
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1888 - 1890Spammer Detection and Identification on Social Network Using Machine Learning
Dr. Shameem Akhter, Noorain Saba
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3173 - 3178An Overview of Pattern Recognition Applications and Its Approaches: A Review
Rajleen Kaur
Similar Articles with Keyword 'K-Means'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2790 - 2794Risk Distribution and Validation of Data in Passport Data Analysis Using Cluster Analysis
Sucheta Gulia, Dr. Rajan Vohra
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2374 - 2376A Survey of Novel Clustering and Knowledge Extraction from Log
Vasim Dilawar Mujawar, Prof. Pratima Bhati
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1164 - 1169A Survey on Scalable Big Data Analytics Platform
Ravindra Phule, Madhav Ingle
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1440 - 1443Automated Annotation System (AAS) Based on Probabilistic Clustering Algorithms
Silja Joy, Nisha J R
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1634 - 1638Performance Comparison of Hard and Fuzzy Clustering Algorithms on ESTs of Human Genes
Abhilasha Chaudhuri, Asha Ambhaikar
Similar Articles with Keyword 'Genetic Algorithm'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 338 - 384Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm
Dr. Niju P. Joseph, Dr. Priyanka Surendran
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1334 - 1337Mutation Testing Techniques in Software Testing: A Review
Dushyant Singh, Parulpreet Singh
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2275 - 2278Data Collection from Clusters in Wireless Sensor Network with Help of Mobile Nodes
Suraj Borge, Mayura Kinikar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 681 - 686An Evolving Approach on Efficient Web Crawler using Fuzzy Genetic Algorithm
P. Jaganathan, T. Karthikeyan
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1593 - 1596Review on Heart Disease Diagnosis Based on Data Mining Techniques
Punam Bajaj, Preeti Gupta
Similar Articles with Keyword 'Detection rate'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2309 - 2312Email Spam Detection Framework with underlined Coefficient Equality Technique
Harikrishna K, Y Siva Prasad
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1220 - 1223EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature
Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2105 - 2111EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks
H. Syed Siddiq, M. Hymavathi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1628 - 1631A Survey On XML-Injection Attack Detection Systems
Swati Ramesh Kesharwani, Aarti Deshpande
Similar Articles with Keyword 'False alarm rate'
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 1612 - 1617Intrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning Algorithms
Amol S. Jadhav, Dhanashree Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3054 - 3057A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection
Arpitha J, Nagaraj Naik
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1138 - 1140Finding Anomaly with Fuzzy Rough C-Means Using Semi-Supervised Approach
Gadekar S. S., Prof. Shinde S. M.
Similar Articles with Keyword 'Intrusion detection'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2085 - 2089Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2025 - 2030Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System
Hardik M. Shingala, Mukesh Sakle
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1689 - 1692ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems
Vinod Kumar, Syeda Asra, Yallappa Meti
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1758 - 1764Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network
T. Sankar, M. Prakash
Similar Articles with Keyword 'data mining'
Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018
Pages: 1409 - 1411Students Performance Prediction Using FP-Tree Data Mining Techniques
Eliakim Ombati Akama
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1165 - 1168Privacy Preserving Closed Frequent Pattern Mining
Anju Vijayan
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 2041 - 2047Adaptive Analysis of Knowledge Engineering and Pattern Recognition on Medical Data
Jani Basha, Dasari. Rajesh
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2790 - 2794Risk Distribution and Validation of Data in Passport Data Analysis Using Cluster Analysis
Sucheta Gulia, Dr. Rajan Vohra
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 708 - 710A Review on Efficient Algorithms for Mining High Utility Item Sets
Nutan Sarode, Devendra Gadekar
Similar Articles with Keyword 'KDD cup 99'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3054 - 3057A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection
Arpitha J, Nagaraj Naik
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 511 - 516Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset
Swapnali G. Game, S. B. Natikar
Research Paper, Computer Science & Engineering, Sudan, Volume 6 Issue 9, September 2017
Pages: 337 - 342Intrusion Detection System Using Weka Data Mining Tool
Asma Abbas Hassan, Alaa F. Sheta, Talaat M. Wahbi