Adaptive Framework for Network Intrusion Detection by Using Genetic-Based Machine Learning Algorithm

被引:0
|
作者
Al-Sharafat, Wafa' S. [1 ]
Naoum, Reyadh Sh. [1 ,2 ]
机构
[1] Al Byt Univ, Informat Technol Coll, Comp Informat Syst Dept, Al Bayt, Jordan
[2] IT Collage, Arab Acad Financial & Banking Sci, Amman, Jordan
关键词
Network intrusion detection; SSGA; Modified SSGBML KDD' 99;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer networks have expanded significantly in use and in numbers. This expansion makes them target to different attacks. Intrusion Detection System (IDS) is used to identify unknown or new type of attacks or in dynamic environments as mobile networks. As a result, it is necessary to find a ways to implement and operate IDSs. Among different techniques, Genetic-based machine learning algorithm (GBML) which offers a good ability to be adapted to changing environments, robustness to noise and ability to identify unknown attacks. The objective of this paper is to incorporate different techniques into classifier system to detect and classify intrusion from normal network packet. Among several techniques, steady state genetic-based machine leaning algorithm (SSGBML) which will be used to detect intrusions. Steady State Genetic Algorithm (SSGA) and Zeroth Level Classifier system (ZCS) are investigated. SSGA is used as a discovery mechanism for classifiers, while ZCS plays the role of detector by matching incoming environment message with classifiers to determine whether it is normal or intrusion. As a feedback, the environment will make a decision on whether to take action or not. In order to attain the best results, modifying SSGA will enhance our discovery engine. The experiments and evaluations of the proposed method were performed with the KDD 99 intrusion detection dataset.
引用
收藏
页码:55 / 61
页数:7
相关论文
共 50 条
  • [1] An adaptive genetic-based signature learning system for intrusion detection
    Shafi, Kamran
    Abbass, Hussein A.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (10) : 12036 - 12043
  • [2] Genetic-based adaptive intrusion detection system
    Li Yun-xia
    Zheng Hong
    Li Ping
    [J]. Proceedings of 2005 Chinese Control and Decision Conference, Vols 1 and 2, 2005, : 1233 - 1236
  • [3] Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection
    Kamran Shafi
    Hussein A. Abbass
    [J]. Pattern Analysis and Applications, 2013, 16 : 549 - 566
  • [4] Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection
    Shafi, Kamran
    Abbass, Hussein A.
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2013, 16 (04) : 549 - 566
  • [5] Network intrusion detection system using an optimized machine learning algorithm
    Alabdulatif, Abdulatif
    Rizvi, Syed Sajjad Hussain
    [J]. MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2023, 42 (01) : 153 - 164
  • [6] Adaptive Intrusion Detection Using Machine Learning
    Neethu, B.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (03): : 118 - 124
  • [7] Improving the Efficiency of Genetic-Based Incremental Local Outlier Factor Algorithm for Network Intrusion Detection
    Alghushairy, Omar
    Alsini, Raed
    Ma, Xiaogang
    Soule, Terence
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE AND APPLIED COGNITIVE COMPUTING, 2021, : 1011 - 1027
  • [8] Machine learning based framework for network intrusion detection system using stacking ensemble technique
    Parashar, Anshu
    Saggu, Kuljot Singh
    Garg, Anupam
    [J]. INDIAN JOURNAL OF ENGINEERING AND MATERIALS SCIENCES, 2022, 29 (04) : 509 - 518
  • [9] Adaptive Intrusion Detection Algorithm based on Learning Algorithm
    Kim, Dae-Wook
    Yang, Jae-Won
    Sim, Kwee-Bo
    [J]. IECON 2004: 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL 3, 2004, : 2229 - 2233
  • [10] Machine Learning Based Network Intrusion Detection
    Lee, Chie-Hong
    Su, Yann-Yean
    Lin, Yu-Chun
    Lee, Shie-Jue
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), 2017, : 79 - 83