Research Article

Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm

by  Swati Paliwal, Ravindra Gupta
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 60 - Issue 19
Published: December 2012
Authors: Swati Paliwal, Ravindra Gupta
10.5120/9813-4306
PDF

Swati Paliwal, Ravindra Gupta . Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm. International Journal of Computer Applications. 60, 19 (December 2012), 57-62. DOI=10.5120/9813-4306

                        @article{ 10.5120/9813-4306,
                        author  = { Swati Paliwal,Ravindra Gupta },
                        title   = { Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 60 },
                        number  = { 19 },
                        pages   = { 57-62 },
                        doi     = { 10.5120/9813-4306 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Swati Paliwal
                        %A Ravindra Gupta
                        %T Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm%T 
                        %J International Journal of Computer Applications
                        %V 60
                        %N 19
                        %P 57-62
                        %R 10.5120/9813-4306
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. To control these threats, recognition of attacks is critical matter. Probing, Denial of Service (DoS), Remote to User (R2L) Attacks are some of the attacks which affects large number of computers in the world daily. Detection of these attacks and prevention of computers from it is a major research topic for researchers throughout the world. In this paper idea for use of a Genetic Algorithm (GA) based approach for generation of rules to detect Probing, DoS and R2L attacks on the system is proposed.

References
  • M. Botha, R. Solms, "Utilizing Neural Networks For Effective Intrusion Detection", ISSA,2004.
  • R. Graham, "FAQ: Network Intrusion Detection Systems". March 21, 2000.
  • Chittur A. "Model Generation for an Intrusion Detection System Using Genetic Algorithms, publications/gaids-thesis01. pdf, accessed in 2006.
  • B. Uppalaiah, 2K. Anand, 3B. Narsimha, 4S. Swaraj, 5T. Bharat,"Genetic Algorithm Approach to Intrusion Detection System", IJCST Vol. 3, Issue 1, Jan. - March 2012.
  • Mr. Anurag Andhare,Prof. Arvind Bhagat Patil," Denial-of-Service Attack Detection Using Genetic-Based Algorithm", International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 2, Issue 2, Mar-Apr 2012, pp. 094-098.
  • KDD cup 1999 data, http:// kdd. ics. uci. edu/ databases/kddcup99/kddcup99. html
  • Mohammad Sazzadul Hoque1, Md. Abdul Mukit2 and Md. Abu Naser Bikas3," An Implementation of Intrusion Detection System Using Genetic Algorithm", International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 2, March 2012.
  • T. Xiao, G. Qu, S. Hariri, and M. Yousif, "AnbEfficient Network Intrusion Detection Method Based on Information Theory and Genetic Algorithm", Proceedings of the 24th IEEE International Performance Computing and Communications Conference (IPCCC '05), Phoenix, AZ, USA. 2005. Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Net.
  • W. Li, "Using Genetic Algorithm for Network Intrusion Detection". "A Genetic Algorithm Approach to Network Intrusion Detection". SANS Institute, USA, 2004.
  • R. H. Gong, M. Zulkernine, P. Abolmaesumi, "A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection", 2005.
  • Bridges, Susan, Rayford B. Vaughn,"Intrusion Detection via Fuzzy Data Mining", In Proceedings of 12th Annual Canadian Information Technology Security Symposium, pp. 109-122, Ottawa, Canada, 2000.
  • Selvakani S, R. S. Rajesh," Genetic Algorithm for framing rules for Intrusion Detection", IJCSNS, Vol. 7, No. 11, 2007.
  • W. Lu, I. Traore,"Detecting new forms of network intrusion using genetic programming", Computational Intelligence Vol. 20, Issue 3, 2004, pp. 475-494.
  • Crosbie, Mark, Gene Spafford,"Applying Genetic Programming to Intrusion Detection", In Proceeding of 1995 AAAI Fall Symposium on Genetic Programming, pp. 1-8, Cambridge, Massachusetts, 1995.
  • Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi," A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection".
  • Gong RH, Zulkernine M, Abolmaesumi P. "A Software Implementation of a Genetic Algorithm based approach to Network Intrusion Detection". In: Proceedings of the sixth international conference on software engineering, artificial intelligence, networking and parallel/distributed computing and first ACIS international workshop on self-assembling wireless networks (SNPD/SAWN„05), 2005.
  • Middlemiss M and Dick G, "Feature Selection of Intrusion detection data using a hybrid genetic of hybrid Intelligent systems, IOS Press Amsterdam, PP. 519-527, 2003
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Probing Denial of Service and Remote to User attacks Genetic Algorithm Intrusion Detection System Rule Set KDD Cup 99 Dataset

Powered by PhDFocusTM