Innovative Genetic approach For Intrusion Detection by Using Decision Tree

被引:2
作者
Sharma, Vikas [1 ]
Nema, Aditi [1 ]
机构
[1] Oriental Inst Sci & Technol, Dept Comp Sci & Engn, Bhopal, India
来源
2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013) | 2013年
关键词
Genetic algorithm; layered approach; PCA;
D O I
10.1109/CSNT.2013.93
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion detection has been studied for approximately 20 years. Intrusion detection provides a way to identify intrusion and allow responses to attacks against the systems. We present a machine learning approach known as Genetic Algorithm, to identify such attack type of connections. Intrusion detection system used information in the form of audit trails or packet of the network. In this paper we try to solve the fidelity problem. The intrusion detection systems have more result or information in misinterpretations or missed events is known as fidelity.
引用
收藏
页码:418 / 422
页数:5
相关论文
共 10 条
[1]  
Anderson James P., 1980, TECHNICAL REPORT, P98
[2]  
[Anonymous], 2009, P 2009 IEEE S COMP I
[3]  
Blake C. L., 1998, Uci repository of machine learning databases
[4]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[5]  
Gupta Kapil Kumar, 2010, IEEE Trans. On Dependable and Secure Computing, V7
[6]  
Hoque Mohammad Sazzadul, 2012, INT J NETWORK SECURI, V4
[7]  
Lakhina S., 2010, INT J ENG SCI TECHNO, V2, P1790
[8]  
Ning P., INTRUSION DETECTION
[9]  
Srinivasulu P., 2010, INT J ADV SOFT COMPU, V2
[10]  
Upendra, 2012, INT J SCI RES PUBLIC, V2