Vector Based Genetic Algorithm to optimize predictive analysis in network security

被引:15
作者
Ijaz, Sidra [1 ]
Hashmi, Faheel A. [2 ]
Asghar, Sohail [1 ]
Alam, Masoom [1 ]
机构
[1] COMSATS Inst Informat Technol, Dept Comp Sci, Islamabad, Pakistan
[2] COMSATS Inst Informat Technol, Dept Phys, Islamabad, Pakistan
关键词
Genetic algorithm; IDS; Misuse detection; Artificial intelligence; INTRUSION DETECTION; SYSTEMS;
D O I
10.1007/s10489-017-1026-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new Intrusion Detection System (IDS) for network security is proposed making use of a Vector-Based Genetic Algorithm (VBGA) inspired by evolutionary approaches. The novelty in the algorithm is to represent chromosomes as vectors and training data as matrices. This approach allows multiple pathways to calculate fitness function out of which one particular methodology is used and tested. The proposed method uses the overlap of the matrices with vector chromosomes for model building. The fitness of the chromosomes is calculated from the comparison of true and false positives in test data. The algorithm is flexible to train the chromosomes for one particular attack type or to detect the maximum number of attacks. The VBGA has been tested on two datasets (KDD Cup-99 and CTU-13). The proposed algorithm gives high detection rate and low false positives as compared to traditional Genetic Algorithm. A detailed comparative analysis is given of proposed VBGA with the traditional string-based genetic algorithm on the basis of accuracy and false positive rates. The results show that vector based genetic algorithm provides a significant improvement in detection rates keeping false positives at minimum.
引用
收藏
页码:1086 / 1096
页数:11
相关论文
共 39 条
  • [1] Aickelin U, 2003, LECT NOTES COMPUT SC, V2787, P147
  • [2] Aickelin Uwe, 2007, Information Security Technical Report, V12, P218, DOI 10.1016/j.istr.2007.10.003
  • [3] Alazab M., 2011, AusDM, V11, P171, DOI DOI 10.5555/2483628.2483648
  • [4] Mutual information-based feature selection for intrusion detection systems
    Amiri, Fatemeh
    Yousefi, MohammadMahdi Rezaei
    Lucas, Caro
    Shakery, Azadeh
    Yazdani, Nasser
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1184 - 1199
  • [5] Anil S., 2013, 2013 4 INT C COMPUTI, P1, DOI [10.1109/ICCCNT.2013.6726604, DOI 10.1109/ICCCNT.2013.6726604]
  • [6] [Anonymous], NEURAL COMPUT APPL
  • [7] [Anonymous], 2000, P DARPA INFORM SURVI, DOI [DOI 10.1109/DISCEX.2000.821515, 10.1109/DISCEX.2000.821515]
  • [8] [Anonymous], 1991, Handbook of Genetic Algorithms
  • [9] Aziz ASA, 2013, FED CONF COMPUT SCI, P769
  • [10] Improving network security using genetic algorithm approach
    Bankovic, Zorana
    Stepanovic, Dusan
    Bojanic, Slobodan
    Nieto-Taladriz, Octavio
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (5-6) : 438 - 451