International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 56 - Number 15 |
Year of Publication: 2012 |
Authors: S. N. Pawar, R. S. Bichkar |
10.5120/8971-3217 |
S. N. Pawar, R. S. Bichkar . Using Enumeration in a GA based Intrusion Detection. International Journal of Computer Applications. 56, 15 ( October 2012), 44-48. DOI=10.5120/8971-3217
In the last few years there has been a tremendous increase in connectivity between systems which has brought about limitless possibilities and opportunities. Unfortunately security related problems have also increased at the same rate. Computer systems are becoming increasingly vulnerable to attacks. These attacks or intrusions based on flaws in operating system or application programs usually read or modify confidential information or render the system useless. Different soft computing techniques are used for network intrusion detection (NID). This paper presents an effective GA based approach to generate the classification rules for network intrusion detection. While applying GA an, enumeration technique is used to select the gene values in a chromosome. This enumeration technique substantially reduces the computational time required for population generation and yields more appropriate rules. These rules are then used to detect the network intrusions. Experimental results show that this technique is more effective in detecting intrusions.