SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. IV (July – Aug. 2015), PP 65-68
www.iosrjournals.org
DOI: 10.9790/0661-17446568 www.iosrjournals.org 65 | Page
A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy
To Improve Anomaly or Intrusion
Er.Kamaldeep Kaur1
, Er. Simranjit Kaur Dhindsa2
1
(CSE, ACET/PTU ,India)
2
(CSE, ACET/PTU ,India)
Abstract: This paper describes a technique of applying Genetic Algorithm (GA) and fuzzy to network Intrusion
Detection Systems (IDSs). A brief overview of a hybrid approach of genetic algorithm and fuzzy to improve
anomaly or intrusion is presented. . This paper proposes genetic algorithm and fuzzy to generate that are able
to detect anomalies and some specific intrusions. The goal of intrusion detection is to monitor network activities
automatically, detect malicious attacks and to establish a proper architecture of the computer network security.
Experimental results demonstrate that we can achieve better running time and accuracy with these
modifications.
Keywords: anomaly, clustering, fuzzy algorithm, fuzzy set., genetic algorithm, intrusion detection.
I. Introduction
An intrusion detection system (IDS) is a device or software application that monitors network or
system activities for malicious activities or policy violations and produces reports to a management station.
Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring
system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible
incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSs for
other purposes, such as identifying problems with security policies, documenting existing threats and deterring
individuals from violating security policies. IDPSs have become a necessary addition to the security
infrastructure of nearly every organization.
II. Anomaly
1.Anomaly- Anomalies is the data within the database; it is the copy of the original data it needs to be updated
in order to avoid problems such as viewing the website. There are four types of anomalies which are Insertion
anomaly, Deletion anomaly, Duplicate entry and Modify (Update anomaly).
Database anomalies, are really just unmatched or missing information caused by limitations or flaws
within a given database. Databases are designed to collect data and sort or present it in specific ways to the end
user. Entering or deleting information, be it an update or a new record can cause issues if the database is limited
or has „bugs‟.
1.1 Insertion anomaly- An insertion anomaly means that it is difficult to insert new records into the database.
1.2 Update anomaly- An update anomaly occurs when the same data item has to be updated more than once.
This can lead to errors and inconsistency of data.
1.3 Deletion anomaly A deletion anomaly occurs when data is lost because of the deletion of other data.
A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion
DOI: 10.9790/0661-17446568 www.iosrjournals.org 66 | Page
III. Techniques Of Intrusion Detection
1. Clustering-Clustering can be considered the most important unsupervised learning problem; so, as every
other problem of this kind, it deals with finding a structure in a collection of unlabeled data.
A loose definition of clustering could be “the process of organizing objects into groups whose members are
similar in some way”. A cluster is a collection of objects which are “similar” between them and are “dissimilar”
to the objects belonging to other clusters.
1.1 Goal of Clustering-The goal of clustering is to determine the intrinsic grouping in a set of unlabeled data.
But how to decide what constitutes a good clustering? It can be shown that there is no absolute “best” criterion
which would be independent of the final aim of the clustering. Consequently, it is the user which must supply
this criterion, in such a way that the result of the clustering will suit their needs. For instance, we could be
interested in finding representatives for homogeneous groups (data reduction), in finding “natural clusters” and
describe their unknown properties (“natural” data types), in finding useful and suitable groupings (“useful” data
classes) or in finding unusual data objects (outlier detection).
1.2 Possible Applications- Clustering algorithms can be applied in many fields, for instance:
 Marketing: finding groups of customers with similar behavior given a large database of customer data
containing their properties and past buying records;
 Biology: classification of plants and animals given their features;
 Libraries: book ordering;
 Insurance: identifying groups of motor insurance policy holders with a high average claim cost; identifying
frauds;
 City-planning: identifying groups of houses according to their house type, value and geographical location;
 Earthquake studies: clustering observed earthquake epicenters to identify dangerous zones;
 WWW: document classification; clustering weblog data to discover groups of similar access patterns.
1.3 Fuzzy C-Means Clustering-Fuzzy c-means (FCM) is a method of clustering which allows one piece of data
to belong to two or more clusters. This method (developed by Dunn in 1973 and improved by Bezdek in 1981)
is frequently used in pattern recognition. It is based on minimization of the following objective function. The
membership of fuzzy variable in a fuzzy set is determined by a function that produces values within the
interval(0,1). Fuzzy rules can be “if the temperature is cold and the wind is strong than wear warm clothes”
where temperature and wind are antecedent fuzzy variables. Wear is a consequent fuzzy variables and cold,
strong and warm clothes are fuzzy sets.
2. Genetic Algorithm-Genetic algorithm use ideas based on the language of natural genetics and biological
evolution. Genetic allows humans to contribute solution suggestions to the evolutionary process. Genetic
algorithm finds application in computational science, engineering, economics, chemistry, manufacturing.
Genetic algorithm requires two functions-
 Genetic representation-it can encode appearance, behaviour, physical qualities of individuals. Designing a
good genetic representation is expensive and evolvable is a hard problem in evolutionary computation.
 Fitness function- it is a particular type of objective function that is used to summarize as a single figure of
merit. It flow close a given design solution is to achieving the set aims.
2.1 Genetic Algorithm Advantages To Intrusion Detection Systems
The implementation of genetic algorithms offers many advantages to intrusion detection systems. The benefits
of using genetic algorithms for intrusion detection can be summarized as:
 Genetic algorithms offer intrusion detection systems an intrinsic parallelism.
 Genetic algorithms are capable of working in multiple directions simultaneously. This makes them
beneficial for analyzing the huge volumes of multi-dimensional data to be processed by an intrusion
detection system.
 Genetic algorithms work with populations of solutions rather than a single solution. This makes them
suitable for behaviour based intrusion detection, where the behaviour attributes may exhibit varying values.
 Genetic algorithms are highly re-trainable. Therefore, using genetic algorithms for intrusion detection will
add to the adaptability of the system.
 Genetic algorithms evolve over time by using crossover and mutation. Property of evolving over time
makes them a good choice for dynamic rule generation.
A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion
DOI: 10.9790/0661-17446568 www.iosrjournals.org 67 | Page
IV. Results
We have to calculate the value of fit value and time and then we plot the graph with the help of clustering and
Genetic algorithm.
parameter Fit value Time
G_num 56.9 21.59
S number 70.61 2.73
np 90.84 6.92
f 90.84 5.17
strategy 91.02 5.15
cr 91.02 5.18
threshold 90.85 5.16
Table1.
Fig.1 Anomaly Detection using Genetic Algo
parameter Fit value Time
G_num 35.01 39.44
S number 69.06 2.77
np 90.88 8.8
f 90.85 5.24
strategy 91.02 5.23
cr 91.02 5.26
threshold 91.02 5.37
Table 2
0
20
40
60
80
100
fit value
time
Fig.2
V. Conclusion
We have analysed an anomaly based intrusion detection system in detecting the intrusion behaviour
within a network. Genetic algorithm and fuzzy decision-making module was designed to build the system more
accurate for attack detection. Our experiments showed that the proposed approach works well in detecting
different attacks. The accuracy of fuzzy classifiers and Genetic algorithm was good and comparable to those
reported in the literature. Also, the accuracy can further be improved applying specific strategies to generate the
fuzzy and genetic algorithm for each monitored parameter.
A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion
DOI: 10.9790/0661-17446568 www.iosrjournals.org 68 | Page
Acknowledgements
I would like to express a deep sense of gratitude to my Project Guide, Er. Simranjit Kaur
Dhindsa,Assistant Professor of Department, Department of Computer Science and Engineering for her guidance
and support in defining the design problem and towards the completion of my thesis work. I could learn the
technique of organizing and writing quality research matter only because of her erudite teachings throughout the
work. This impact has left a permanent impression on my personality and written & verbal communication. I
also express my great admiration & indebtedness for the manner in which she carried out a thorough editing of
our papers & the thesis, despite his overwhelming busy schedule & numerous responsibilities. Without her wise
counsel and able guidance, it would have been impossible to complete the thesis in this manner.
References
[1]. Shingo Mabu, Member, IEEE, Ci Chen, Nannan Lu, Kaoru Shimada,and Kotaro Hirasawa, Member, IEEE, “An Intrusion-Detection
Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming” in January 2011.
[2]. Monowar H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita , “Network Anomaly Detection: Methods, Systems and Tools” in 2014.
[3]. Z. Bankovi´c, D. Stepanovi´c, S. Bojani´c, and O. Nieto-Taladriz, “Improving network security using genetic algorithm approach,”
Comput. Elect.Eng., vol. 33, pp. 438–451, 2007.
[4]. A. Sundaram, “An introduction to intrusion detection,” Crossroads,vol. 2, no. 4, pp. 3–7, April 1996.
[5]. V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection : A Survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 15:1–
15:58,September 2009.
[6]. L. Portnoy, E. Eskin, and S. J. Stolfo, “Intrusion detection with unlabeled data using clustering,” in Proc. ACM Workshop on Data
Mining Applied to Security, 2001.
[7]. R. Heady, G. Luger, A. Maccabe, and M. Servilla, “The Architecture of a Network Level Intrusion Detection System,” Computer
Science Department, University of New Mesxico, Tech. Rep. TR-90, 1990.
[8]. A. A. Ghorbani, W. Lu, and M. Tavallaee,“Network Intrusion Detection and Prevention : Concepts and Techniques” ser. Advances
in Information Security. Springer-verlag, October 28 2009.
[9]. P. SNing and S. Jajodia, “Intrusion Detection Techniques”. H Bidgoli (Ed.), The Internet Encyclopedia, 2003.
[10]. F.Wikimedia,“Intrusiondetectionsystem,”http://en.wikipedia.org/wiki/Intrusion-detection system, AAFeb 2009.
[11]. H. Debar, M. Dacier, and A. Wespi, “Towards a Taxonomy of Intrusion Detection Systems,” Computer Networks, vol. .31, no. 8,
pp. 805–822, 1999.
[12]. D. B. P. and M. Pels, “Host-Based Intrusion Detection Systems,” Faculty of Science, Informatics Institute, University of
Amsterdam, Technical Report, 2005.
[13]. Aleksandar, Kumar, and Jaideep, Managing Cyber Threats: Issues, Approaches, and Challenges. Springer Science + Business
Media, 2005.
[14]. D. E. Denning, “An Intrusion Detection Model,” Special issue on Computer Security and Privacy, vol. 13, no. 2, pp. 222–232,
1987.

More Related Content

What's hot

A Stacked Generalization Ensemble Approach for Improved Intrusion Detection
A Stacked Generalization Ensemble Approach for Improved Intrusion DetectionA Stacked Generalization Ensemble Approach for Improved Intrusion Detection
A Stacked Generalization Ensemble Approach for Improved Intrusion DetectionIJCSIS Research Publications
 
Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models IJECEIAES
 
Predicting Fault-Prone Files using Machine Learning
Predicting Fault-Prone Files using Machine LearningPredicting Fault-Prone Files using Machine Learning
Predicting Fault-Prone Files using Machine LearningGuido A. Ciollaro
 
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemThe Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemIOSRjournaljce
 
Efficiency of LSB steganography on medical information
Efficiency of LSB steganography on medical information Efficiency of LSB steganography on medical information
Efficiency of LSB steganography on medical information IJECEIAES
 
Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...ijsrd.com
 
Test PDF
Test PDFTest PDF
Test PDFAlgnuD
 
Handwriting identification using deep convolutional neural network method
Handwriting identification using deep convolutional neural network methodHandwriting identification using deep convolutional neural network method
Handwriting identification using deep convolutional neural network methodTELKOMNIKA JOURNAL
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal clusterVenkat Projects
 
IRJET- Factoid Question and Answering System
IRJET-  	  Factoid Question and Answering SystemIRJET-  	  Factoid Question and Answering System
IRJET- Factoid Question and Answering SystemIRJET Journal
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networksrahulmonikasharma
 
Improving Intrusion Detection with Deep Packet Inspection and Regular Express...
Improving Intrusion Detection with Deep Packet Inspection and Regular Express...Improving Intrusion Detection with Deep Packet Inspection and Regular Express...
Improving Intrusion Detection with Deep Packet Inspection and Regular Express...IJCSIS Research Publications
 
Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabijcses
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...Alexander Decker
 
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...Alexander Decker
 

What's hot (18)

A Stacked Generalization Ensemble Approach for Improved Intrusion Detection
A Stacked Generalization Ensemble Approach for Improved Intrusion DetectionA Stacked Generalization Ensemble Approach for Improved Intrusion Detection
A Stacked Generalization Ensemble Approach for Improved Intrusion Detection
 
Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models
 
Predicting Fault-Prone Files using Machine Learning
Predicting Fault-Prone Files using Machine LearningPredicting Fault-Prone Files using Machine Learning
Predicting Fault-Prone Files using Machine Learning
 
573 248-259
573 248-259573 248-259
573 248-259
 
Ijritcc 1378
Ijritcc 1378Ijritcc 1378
Ijritcc 1378
 
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemThe Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
 
Efficiency of LSB steganography on medical information
Efficiency of LSB steganography on medical information Efficiency of LSB steganography on medical information
Efficiency of LSB steganography on medical information
 
Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...
 
1855 1860
1855 18601855 1860
1855 1860
 
Test PDF
Test PDFTest PDF
Test PDF
 
Handwriting identification using deep convolutional neural network method
Handwriting identification using deep convolutional neural network methodHandwriting identification using deep convolutional neural network method
Handwriting identification using deep convolutional neural network method
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
 
IRJET- Factoid Question and Answering System
IRJET-  	  Factoid Question and Answering SystemIRJET-  	  Factoid Question and Answering System
IRJET- Factoid Question and Answering System
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
 
Improving Intrusion Detection with Deep Packet Inspection and Regular Express...
Improving Intrusion Detection with Deep Packet Inspection and Regular Express...Improving Intrusion Detection with Deep Packet Inspection and Regular Express...
Improving Intrusion Detection with Deep Packet Inspection and Regular Express...
 
Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlab
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
 
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...
 

Viewers also liked

LordJeshuaInheritanceMay2016.7007
LordJeshuaInheritanceMay2016.7007LordJeshuaInheritanceMay2016.7007
LordJeshuaInheritanceMay2016.7007Lord Jesus Christ
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentationmjwilson144
 
Broadband Availability Near NYS Capitol (albany, columbia & greene counties)
Broadband Availability Near NYS Capitol (albany, columbia & greene counties)Broadband Availability Near NYS Capitol (albany, columbia & greene counties)
Broadband Availability Near NYS Capitol (albany, columbia & greene counties)Rich Frank
 
Prezentare rebega geta
Prezentare rebega getaPrezentare rebega geta
Prezentare rebega getarebegageta
 
Atrai o meu coração-Filhos do Homem
Atrai o meu coração-Filhos do HomemAtrai o meu coração-Filhos do Homem
Atrai o meu coração-Filhos do HomemDhone da Hora
 
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02Marioly Ch
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 

Viewers also liked (20)

K010116671
K010116671K010116671
K010116671
 
CV_Rakesh
CV_RakeshCV_Rakesh
CV_Rakesh
 
LordJeshuaInheritanceMay2016.7007
LordJeshuaInheritanceMay2016.7007LordJeshuaInheritanceMay2016.7007
LordJeshuaInheritanceMay2016.7007
 
N012147579
N012147579N012147579
N012147579
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Broadband Availability Near NYS Capitol (albany, columbia & greene counties)
Broadband Availability Near NYS Capitol (albany, columbia & greene counties)Broadband Availability Near NYS Capitol (albany, columbia & greene counties)
Broadband Availability Near NYS Capitol (albany, columbia & greene counties)
 
Prezentare rebega geta
Prezentare rebega getaPrezentare rebega geta
Prezentare rebega geta
 
F012613442
F012613442F012613442
F012613442
 
Atrai o meu coração-Filhos do Homem
Atrai o meu coração-Filhos do HomemAtrai o meu coração-Filhos do Homem
Atrai o meu coração-Filhos do Homem
 
K010126674
K010126674K010126674
K010126674
 
F010513135
F010513135F010513135
F010513135
 
anplppfinal
anplppfinalanplppfinal
anplppfinal
 
M012139397
M012139397M012139397
M012139397
 
H010234144
H010234144H010234144
H010234144
 
M010219295
M010219295M010219295
M010219295
 
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
 
E010243540
E010243540E010243540
E010243540
 
E1304012630
E1304012630E1304012630
E1304012630
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
F012223944
F012223944F012223944
F012223944
 

Similar to J017446568

A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsDrjabez
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...Alexander Decker
 
rpaper
rpaperrpaper
rpaperimu409
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMCOMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMcscpconf
 
IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...IRJET Journal
 
Classification with R
Classification with RClassification with R
Classification with RNajima Begum
 
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesData Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesIJAEMSJORNAL
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsIOSR Journals
 
Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)ijdmtaiir
 
V1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxV1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxpraveena06
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHODSURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHODIJCI JOURNAL
 
Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...ijitjournal
 
Real Time Intrusion Detection System Using Computational Intelligence and Neu...
Real Time Intrusion Detection System Using Computational Intelligence and Neu...Real Time Intrusion Detection System Using Computational Intelligence and Neu...
Real Time Intrusion Detection System Using Computational Intelligence and Neu...ijtsrd
 
Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTIJERA Editor
 

Similar to J017446568 (20)

A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
 
rpaper
rpaperrpaper
rpaper
 
V01 i010414
V01 i010414V01 i010414
V01 i010414
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMCOMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
 
IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
 
Classification with R
Classification with RClassification with R
Classification with R
 
C3602021025
C3602021025C3602021025
C3602021025
 
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesData Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
 
Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)
 
V1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxV1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docx
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHODSURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
 
Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...
 
Real Time Intrusion Detection System Using Computational Intelligence and Neu...
Real Time Intrusion Detection System Using Computational Intelligence and Neu...Real Time Intrusion Detection System Using Computational Intelligence and Neu...
Real Time Intrusion Detection System Using Computational Intelligence and Neu...
 
Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOT
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

J017446568

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. IV (July – Aug. 2015), PP 65-68 www.iosrjournals.org DOI: 10.9790/0661-17446568 www.iosrjournals.org 65 | Page A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion Er.Kamaldeep Kaur1 , Er. Simranjit Kaur Dhindsa2 1 (CSE, ACET/PTU ,India) 2 (CSE, ACET/PTU ,India) Abstract: This paper describes a technique of applying Genetic Algorithm (GA) and fuzzy to network Intrusion Detection Systems (IDSs). A brief overview of a hybrid approach of genetic algorithm and fuzzy to improve anomaly or intrusion is presented. . This paper proposes genetic algorithm and fuzzy to generate that are able to detect anomalies and some specific intrusions. The goal of intrusion detection is to monitor network activities automatically, detect malicious attacks and to establish a proper architecture of the computer network security. Experimental results demonstrate that we can achieve better running time and accuracy with these modifications. Keywords: anomaly, clustering, fuzzy algorithm, fuzzy set., genetic algorithm, intrusion detection. I. Introduction An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSs for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSs have become a necessary addition to the security infrastructure of nearly every organization. II. Anomaly 1.Anomaly- Anomalies is the data within the database; it is the copy of the original data it needs to be updated in order to avoid problems such as viewing the website. There are four types of anomalies which are Insertion anomaly, Deletion anomaly, Duplicate entry and Modify (Update anomaly). Database anomalies, are really just unmatched or missing information caused by limitations or flaws within a given database. Databases are designed to collect data and sort or present it in specific ways to the end user. Entering or deleting information, be it an update or a new record can cause issues if the database is limited or has „bugs‟. 1.1 Insertion anomaly- An insertion anomaly means that it is difficult to insert new records into the database. 1.2 Update anomaly- An update anomaly occurs when the same data item has to be updated more than once. This can lead to errors and inconsistency of data. 1.3 Deletion anomaly A deletion anomaly occurs when data is lost because of the deletion of other data.
  • 2. A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion DOI: 10.9790/0661-17446568 www.iosrjournals.org 66 | Page III. Techniques Of Intrusion Detection 1. Clustering-Clustering can be considered the most important unsupervised learning problem; so, as every other problem of this kind, it deals with finding a structure in a collection of unlabeled data. A loose definition of clustering could be “the process of organizing objects into groups whose members are similar in some way”. A cluster is a collection of objects which are “similar” between them and are “dissimilar” to the objects belonging to other clusters. 1.1 Goal of Clustering-The goal of clustering is to determine the intrinsic grouping in a set of unlabeled data. But how to decide what constitutes a good clustering? It can be shown that there is no absolute “best” criterion which would be independent of the final aim of the clustering. Consequently, it is the user which must supply this criterion, in such a way that the result of the clustering will suit their needs. For instance, we could be interested in finding representatives for homogeneous groups (data reduction), in finding “natural clusters” and describe their unknown properties (“natural” data types), in finding useful and suitable groupings (“useful” data classes) or in finding unusual data objects (outlier detection). 1.2 Possible Applications- Clustering algorithms can be applied in many fields, for instance:  Marketing: finding groups of customers with similar behavior given a large database of customer data containing their properties and past buying records;  Biology: classification of plants and animals given their features;  Libraries: book ordering;  Insurance: identifying groups of motor insurance policy holders with a high average claim cost; identifying frauds;  City-planning: identifying groups of houses according to their house type, value and geographical location;  Earthquake studies: clustering observed earthquake epicenters to identify dangerous zones;  WWW: document classification; clustering weblog data to discover groups of similar access patterns. 1.3 Fuzzy C-Means Clustering-Fuzzy c-means (FCM) is a method of clustering which allows one piece of data to belong to two or more clusters. This method (developed by Dunn in 1973 and improved by Bezdek in 1981) is frequently used in pattern recognition. It is based on minimization of the following objective function. The membership of fuzzy variable in a fuzzy set is determined by a function that produces values within the interval(0,1). Fuzzy rules can be “if the temperature is cold and the wind is strong than wear warm clothes” where temperature and wind are antecedent fuzzy variables. Wear is a consequent fuzzy variables and cold, strong and warm clothes are fuzzy sets. 2. Genetic Algorithm-Genetic algorithm use ideas based on the language of natural genetics and biological evolution. Genetic allows humans to contribute solution suggestions to the evolutionary process. Genetic algorithm finds application in computational science, engineering, economics, chemistry, manufacturing. Genetic algorithm requires two functions-  Genetic representation-it can encode appearance, behaviour, physical qualities of individuals. Designing a good genetic representation is expensive and evolvable is a hard problem in evolutionary computation.  Fitness function- it is a particular type of objective function that is used to summarize as a single figure of merit. It flow close a given design solution is to achieving the set aims. 2.1 Genetic Algorithm Advantages To Intrusion Detection Systems The implementation of genetic algorithms offers many advantages to intrusion detection systems. The benefits of using genetic algorithms for intrusion detection can be summarized as:  Genetic algorithms offer intrusion detection systems an intrinsic parallelism.  Genetic algorithms are capable of working in multiple directions simultaneously. This makes them beneficial for analyzing the huge volumes of multi-dimensional data to be processed by an intrusion detection system.  Genetic algorithms work with populations of solutions rather than a single solution. This makes them suitable for behaviour based intrusion detection, where the behaviour attributes may exhibit varying values.  Genetic algorithms are highly re-trainable. Therefore, using genetic algorithms for intrusion detection will add to the adaptability of the system.  Genetic algorithms evolve over time by using crossover and mutation. Property of evolving over time makes them a good choice for dynamic rule generation.
  • 3. A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion DOI: 10.9790/0661-17446568 www.iosrjournals.org 67 | Page IV. Results We have to calculate the value of fit value and time and then we plot the graph with the help of clustering and Genetic algorithm. parameter Fit value Time G_num 56.9 21.59 S number 70.61 2.73 np 90.84 6.92 f 90.84 5.17 strategy 91.02 5.15 cr 91.02 5.18 threshold 90.85 5.16 Table1. Fig.1 Anomaly Detection using Genetic Algo parameter Fit value Time G_num 35.01 39.44 S number 69.06 2.77 np 90.88 8.8 f 90.85 5.24 strategy 91.02 5.23 cr 91.02 5.26 threshold 91.02 5.37 Table 2 0 20 40 60 80 100 fit value time Fig.2 V. Conclusion We have analysed an anomaly based intrusion detection system in detecting the intrusion behaviour within a network. Genetic algorithm and fuzzy decision-making module was designed to build the system more accurate for attack detection. Our experiments showed that the proposed approach works well in detecting different attacks. The accuracy of fuzzy classifiers and Genetic algorithm was good and comparable to those reported in the literature. Also, the accuracy can further be improved applying specific strategies to generate the fuzzy and genetic algorithm for each monitored parameter.
  • 4. A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion DOI: 10.9790/0661-17446568 www.iosrjournals.org 68 | Page Acknowledgements I would like to express a deep sense of gratitude to my Project Guide, Er. Simranjit Kaur Dhindsa,Assistant Professor of Department, Department of Computer Science and Engineering for her guidance and support in defining the design problem and towards the completion of my thesis work. I could learn the technique of organizing and writing quality research matter only because of her erudite teachings throughout the work. This impact has left a permanent impression on my personality and written & verbal communication. I also express my great admiration & indebtedness for the manner in which she carried out a thorough editing of our papers & the thesis, despite his overwhelming busy schedule & numerous responsibilities. Without her wise counsel and able guidance, it would have been impossible to complete the thesis in this manner. References [1]. Shingo Mabu, Member, IEEE, Ci Chen, Nannan Lu, Kaoru Shimada,and Kotaro Hirasawa, Member, IEEE, “An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming” in January 2011. [2]. Monowar H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita , “Network Anomaly Detection: Methods, Systems and Tools” in 2014. [3]. Z. Bankovi´c, D. Stepanovi´c, S. Bojani´c, and O. Nieto-Taladriz, “Improving network security using genetic algorithm approach,” Comput. Elect.Eng., vol. 33, pp. 438–451, 2007. [4]. A. Sundaram, “An introduction to intrusion detection,” Crossroads,vol. 2, no. 4, pp. 3–7, April 1996. [5]. V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection : A Survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 15:1– 15:58,September 2009. [6]. L. Portnoy, E. Eskin, and S. J. Stolfo, “Intrusion detection with unlabeled data using clustering,” in Proc. ACM Workshop on Data Mining Applied to Security, 2001. [7]. R. Heady, G. Luger, A. Maccabe, and M. Servilla, “The Architecture of a Network Level Intrusion Detection System,” Computer Science Department, University of New Mesxico, Tech. Rep. TR-90, 1990. [8]. A. A. Ghorbani, W. Lu, and M. Tavallaee,“Network Intrusion Detection and Prevention : Concepts and Techniques” ser. Advances in Information Security. Springer-verlag, October 28 2009. [9]. P. SNing and S. Jajodia, “Intrusion Detection Techniques”. H Bidgoli (Ed.), The Internet Encyclopedia, 2003. [10]. F.Wikimedia,“Intrusiondetectionsystem,”http://en.wikipedia.org/wiki/Intrusion-detection system, AAFeb 2009. [11]. H. Debar, M. Dacier, and A. Wespi, “Towards a Taxonomy of Intrusion Detection Systems,” Computer Networks, vol. .31, no. 8, pp. 805–822, 1999. [12]. D. B. P. and M. Pels, “Host-Based Intrusion Detection Systems,” Faculty of Science, Informatics Institute, University of Amsterdam, Technical Report, 2005. [13]. Aleksandar, Kumar, and Jaideep, Managing Cyber Threats: Issues, Approaches, and Challenges. Springer Science + Business Media, 2005. [14]. D. E. Denning, “An Intrusion Detection Model,” Special issue on Computer Security and Privacy, vol. 13, no. 2, pp. 222–232, 1987.