Efficient calculation of fitness function by calculating reward Penalty for a GA-based Network Intrusion Detection System

Authors(2) :-Jahnavi. S. Vithalpura, H. M. Diwanji

Our network is facing a rapidly evolving threat landscape full of modern applications, exploits, malware and attack strategies that are capable of avoiding traditional methods of detection. Intrusion detection can perform the task of monitoring usability systems to detect any apparition of insecure states. To overcome above mentioned issues we have employed genetic algorithm to improve detection rate of intrusion detection system. To generate healthy rule pool we have focused in design of fitness function. We have proposed a new fitness function based on reward & penalty. This function make chromosome stronger by applying reward and remove weakness from it by deducting penalty. So such a healthy chromosomes generates a best fit population which is reducing false alarm rate and increasing a detection rate. In our work, we have classified a dataset as a normal record or attack record using seven network features and calculated detection rate and false alarm rate. Further we have classified DOS, Probe, and U2R and R2L type of attack from attack cluster. We measured improved efficiency of proposed system by observing improvement in detection rate and reduction in false alarm rate.

Authors and Affiliations

Jahnavi. S. Vithalpura
Department of Computer-IT, L. D. College of engineering, Ahmadabad, Gujarat, India
H. M. Diwanji
Department of Computer-IT, L. D. College of engineering, Ahmadabad, Gujarat, India

Genetic Algorithm, Intrusion, Network Intrusion Detection System, Fitness Function, Reward Penalty

  1. R. Bace, and P. Mell, ?Intrusion Detection Systems?, National Institute of Standards and Technology NIST, 2001.USA
  2. M. Arvidson and M. Carlbark, “Intrusion Detection Systems: Technologies, Weaknesses, and Trends,” 2003.
  3. S. Kumar, Classification and Detection of Computer Intrusions?, Ph.D. Thesis, Purdue University, 1995.
  4.  S. Kumar, and E. H. Spafford, ? A Software Architecture to support Misuse Intrusion Detection?, Technical Report CSD-TR-5-009, 1995.
  5. Shelly Xiaonan Wu, Wolfgang Banzhaf, “The use of computational intelligence in intrusion detection system s: A review” Applied Soft Computing 10 (2010) 1–35 published by elsevier .com
  6. RC Chakraborty, Fundamentals of Genetic Algorithm: AI Course, June 2010, available at http://www.myreaders.info/09genetic_Algorithms.pdf
  7.  S.Owais, V.Snasel, A.Abraham,”Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques” 7th Computer Information Systems and Industrial Management Applications IEEE, 2008
  8. Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi, “A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection”, Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed (SNPD/SAWN’05) 2005 IEEE
  9. Salah Eddine Benaicha, Lalia Saoudi, Salah Eddine Bouhouita Guermeche, Ouarda Lounis ,”Intrusion Detection System Using Genetic Algorithm/’ Proceedings of the Science and Information Conference 2014 IEEE
  10. Zorana Bankovic, Dus?an Stepanovic, Slobodan Bojanic,Octavio Nieto-Taladriz  “Improving network security dsfusing genetic algorithm approach”  computers and electrical engineering  33(2007)publish by elesevier pvt ltd.
  11. S.Owais, V.Snasel, A.Abraham,”Survey: Using
    Genetic Algorithm Approach in Intrusion Detection
    Systems Techniques” 7th Computer Information
    Systems and Industrial Management Applications
    IEEE, 2008
  12. V. Moraveji Hashmei, Z. Muda and W. Yassin, “Improving Intrusion Detection using Genetic Algorithm”, International Technology journal 12(11) pp. 2167-2173, 2013
  13. Li, Wei, “Using Genetic Algorithm for Network Intrusion Detection”, ,Proceedings of the United States Department of Energy Cyber Security Group,(2004)
  14. B. Uppalaiah, K. Anand, B. Narsimha, S. Swaraj, T. Bharat, “Genetic AlgorithmApproach to Intrusion Detection System”, IJCST Vol. 3, Issue 1, Jan-March 2012
  15. Miss Priya U. Kadam, Mr. P. P. Jadhav,”An effective rule generation for Intrusion Detection System using Genetics Algorithm” ,International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 10, October 2013
  16. Bharat S. Dhak, Shrikant Lade, “ An Evolutionary Approach to Intrusion Detection System using Genetic Algorithm” .ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 2, Issue 12, Dec. 2012

Publication Details

Published in : Volume 1 | Issue 3 | May-June 2015
Date of Publication : 2015-06-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 309-315
Manuscript Number : IJSRSET151370
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Jahnavi. S. Vithalpura, H. M. Diwanji, " Efficient calculation of fitness function by calculating reward Penalty for a GA-based Network Intrusion Detection System , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 3, pp.309-315, May-June-2015.
Journal URL : http://ijsrset.com/IJSRSET151370

Follow Us

Contact Us