Open Access   Article Go Back

Effect of Genetic Algorithm on Artificial Neural Network for Intrusion Detection System

A. Dastanpour1 , S. Ibrahim2 , R. Mashinchi3

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-10 , Page no. 10-18, Oct-2016

Online published on Oct 28, 2016

Copyright © A. Dastanpour, S. Ibrahim, R. Mashinchi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Dastanpour, S. Ibrahim, R. Mashinchi, “Effect of Genetic Algorithm on Artificial Neural Network for Intrusion Detection System,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.10-18, 2016.

MLA Style Citation: A. Dastanpour, S. Ibrahim, R. Mashinchi "Effect of Genetic Algorithm on Artificial Neural Network for Intrusion Detection System." International Journal of Computer Sciences and Engineering 4.10 (2016): 10-18.

APA Style Citation: A. Dastanpour, S. Ibrahim, R. Mashinchi, (2016). Effect of Genetic Algorithm on Artificial Neural Network for Intrusion Detection System. International Journal of Computer Sciences and Engineering, 4(10), 10-18.

BibTex Style Citation:
@article{Dastanpour_2016,
author = {A. Dastanpour, S. Ibrahim, R. Mashinchi},
title = {Effect of Genetic Algorithm on Artificial Neural Network for Intrusion Detection System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2016},
volume = {4},
Issue = {10},
month = {10},
year = {2016},
issn = {2347-2693},
pages = {10-18},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1072},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1072
TI - Effect of Genetic Algorithm on Artificial Neural Network for Intrusion Detection System
T2 - International Journal of Computer Sciences and Engineering
AU - A. Dastanpour, S. Ibrahim, R. Mashinchi
PY - 2016
DA - 2016/10/28
PB - IJCSE, Indore, INDIA
SP - 10-18
IS - 10
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1754 1605 downloads 1429 downloads
  
  
           

Abstract

By increasing the advantages of network based systems and dependency of daily life with them, the efficient operation of network based systems is an essential issue. Since the number of attacks has significantly increased, intrusion detection systems of anomaly network behavior have increasingly attracted attention among research community. Intrusion detection systems have some capabilities such as adaptation, fault tolerance, high computational speed, and error resilience in the face of noisy information. So, construction of efficient intrusion detection model is highly required for increasing the detection rate as well as decreasing the false detection. . This paper investigates applying the following methods to detect the attacks intrusion detection system and understand the effective of GA on the ANN result: artificial Neural Network (ANN) for recognition and used Genetic Algorithm (GA) for optimization of ANN result. We use KDD CPU 99 dataset to obtain the results; witch shows the ANN result before the efficiency of GA and compare the result of ANN with GA optimization.

Key-Words / Index Term

Artificial Neural Network (ANN); Intrusion detection; Genetic algorithm (GA); Machine learning; Network Security

References

[1] O. A. Soluade and E. U. Opara, "Security Breaches, Network Exploits and Vulnerabilities: A Conundrum and an Analysis."
[2] H.-H. Gao, H.-H. Yang, and X.-Y. Wang, "Ant colony optimization based network intrusion feature selection and detection," in Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on, 2005, pp. 3871-3875.
[3] Z. Y. M. Liu, "Intrusion Detection Systems," in Applied Mechanics and Materials, 2014, pp. 852-855.
[4] A. Simmonds, P. Sandilands, and L. van Ekert, "An ontology for network security attacks," in Applied Computing, ed: Springer, 2004, pp. 317-323.
[5] K. M. Shazzad and J. S. Park, "Optimization of intrusion detection through fast hybrid feature selection," in Parallel and Distributed Computing, Applications and Technologies, 2005. PDCAT 2005. Sixth International Conference on, 2005, pp. 264-267.
[6] C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin, "Intrusion detection by machine learning: A review," Expert Systems with Applications, vol. 36, pp. 11994-12000, 2009.
[7] A. Tamilarasan, S. Mukkamala, A. H. Sung, and K. Yendrapalli, "Feature ranking and selection for intrusion detection using artificial neural networks and statistical methods," in Neural Networks, 2006. IJCNN`06. International Joint Conference on, 2006, pp. 4754-4761.
[8] V. T. Goh, J. Zimmermann, and M. Looi, "Towards intrusion detection for encrypted networks," in Availability, Reliability and Security, 2009. ARES`09. International Conference on, 2009, pp. 540-545.
[9] R. Ma, "Neural Networks for Intrusion Detection," 2009.
[10] A. Dastanpour, S. Ibrahim, R. Mashinchi, and A. Selamat, "Comparison of genetic algorithm optimization on artificial neural network and support vector machine in intrusion detection system," in Open Systems (ICOS), 2014 IEEE Conference on, 2014, pp. 72-77.
[11] O. Linda, T. Vollmer, and M. Manic, "Neural network based intrusion detection system for critical infrastructures," in Neural Networks, 2009. IJCNN 2009. International Joint Conference on, 2009, pp. 1827-1834.
[12] G. P. a. N. Mishra, "Optimal Feature Selection in Stream Data Classification Using Improved Ensemble Classifier for High Dimension Data," International Journal of Computer Sciences and Engineering, vol. 04, pp. 12-18, Sep -2016.
[13] M. S. Hoque, M. Mukit, M. Bikas, and A. Naser, "An implementation of intrusion detection system using genetic algorithm," arXiv preprint arXiv:1204.1336, 2012.
[14] M. H. Mashinchi, M. R. Mashinchi, and S. M. H. Shamsuddin, "A Genetic Algorithm Approach for Solving Fuzzy Linear and Quadratic Equations," World Academy of Science, Engineering and Technology, vol. 28, 2007.
[15] P. Gupta and S. K. Shinde, "Genetic Algorithm Technique Used to Detect Intrusion Detection," in Advances in Computing and Information Technology, ed: Springer, 2011, pp. 122-131.
[16] V. K. Kshirsagar, S. M. Tidke, and S. Vishnu, "Intrusion Detection System using Genetic Algorithm and Data Mining: An Overview," International Journal of Computer Science and Informatics ISSN (PRINT), pp. 2231-5292, 2012.
[17] C.-H. Tsang, S. Kwong, and H. Wang, "Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection," Pattern Recognition, vol. 40, pp. 2373-2391, 2007.
[18] Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai, and K. Dai, "An efficient intrusion detection system based on support vector machines and gradually feature removal method," Expert Systems with Applications, vol. 39, pp. 424-430, 2012.
[19] F. Amiri, M. Rezaei Yousefi, C. Lucas, A. Shakery, and N. Yazdani, "Mutual information-based feature selection for intrusion detection systems," Journal of Network and Computer Applications, vol. 34, pp. 1184-1199, 2011.
[20] A. Abraham, R. Jain, J. Thomas, and S. Y. Han, "D-SCIDS: Distributed soft computing intrusion detection system," Journal of Network and Computer Applications, vol. 30, pp. 81-98, 2007.
[21] A. Dastanpour and R. A. R. Mahmood, "Feature selection based on genetic algorithm and SupportVector machine for intrusion detection system," in The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013), 2013, pp. 169-181.
[22] X. Sun, Y. Liu, J. Li, J. Zhu, H. Chen, and X. Liu, "Feature evaluation and selection with cooperative game theory," Pattern recognition, vol. 45, pp. 2992-3002, 2012.
[23] B. Luo and J. Xia, "A novel intrusion detection system based on feature generation with visualization strategy," Expert Systems with Applications, vol. 41, pp. 4139-4147, 2014.
[24] Y. Chen, B. Yang, and A. Abraham, "Flexible neural trees ensemble for stock index modeling," Neurocomputing, vol. 70, pp. 697-703, 2007.
[25] M. K. Siddiqui and S. Naahid, "Analysis of KDD CUP 99 Dataset using Clustering based Data Mining," International Journal of Database Theory & Application, vol. 6, 2013.
[26] G. Carl, G. Kesidis, R. R. Brooks, and S. Rai, "Denial-of-service attack-detection techniques," Internet Computing, IEEE, vol. 10, pp. 82-89, 2006.
[27] M. Sabhnani and G. Serpen, "KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection," in Security and Management, 2003, pp. 310-316.
[28] M. Sabhnani and G. Serpen, "Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris Operating System Environment," in Security and Management, 2003, pp. 390-396.
[29] G. Zargar and P. Kabiri, "Identification of effective network features for probing attack detection," in Networked Digital Technologies, 2009. NDT`09. First International Conference on, 2009, pp. 392-397.
[30] A. L. Nelson, G. J. Barlow, and L. Doitsidis, "Fitness functions in evolutionary robotics: A survey and analysis," Robotics and Autonomous Systems, vol. 57, pp. 345-370, 2009.
[31] M. Pillai, J. H. Eloff, and H. Venter, "An approach to implement a network intrusion detection system using genetic algorithms," in Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, 2004, pp. 221-221.
[32] T. P. Fries, "A fuzzy-genetic approach to network intrusion detection," in Proceedings of the 2008 GECCO conference companion on Genetic and evolutionary computation, 2008, pp. 2141-2146.
[33] P. Jongsuebsuk, N. Wattanapongsakorn, and C. Charnsripinyo, "Network intrusion detection with Fuzzy Genetic Algorithm for unknown attacks," in Information Networking (ICOIN), 2013 International Conference on, 2013, pp. 1-5.
[34] S. Dhopte and M. Chaudhari, "Genetic Algorithm for Intrusion Detection System."
Author Profile