Downloads: 132 | Views: 275
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.3 / 10
Applying Genetic Algorithm to Intrusion Detection System
Vrishali Yewale, Vimla Jethani, Tushar Ghorpade
Abstract: Now a days it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. With the rapid expansion of Internet in recent years, computer systems are facing increased number of security threats. Therefore, unwanted intrusions take place when the actual software systems are running. So Intrusion Detection Systems have become a needful component in terms of computer and network security. In this paper, we present an Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network attacks. Parameters and evolution processes for GA are discussed. Also impact on rate of GA operators in IDS for misuse is discussed.
Keywords: Intrusion detection, Genetic Algorithm GA, Intrusion Detection System IDS, Fitness Function
Edition: Volume 4 Issue 4, April 2015
Pages: 524 - 529
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023
Pages: 2571 - 2575Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation
Harish Narne
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021
Pages: 158 - 161MLP and RNN Based Intrusion Detection System Using Machine Learning with Stochastic Optimization
Mithlesh Kumar, Gargishankar Verma
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 4 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 723 - 730A Study: Use of Machine Learning for Cyber Security
Nidhi Kataria Chawla, Monika Gaur