CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Intrusion Detection System based on Learning Fuzzy Rules and Membership Functions using Genetic Algorithms

by Ezat Soleiman, Abdelhamid Fetanat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 13
Year of Publication: 2013
Authors: Ezat Soleiman, Abdelhamid Fetanat
10.5120/12805-0235

Ezat Soleiman, Abdelhamid Fetanat . Intrusion Detection System based on Learning Fuzzy Rules and Membership Functions using Genetic Algorithms. International Journal of Computer Applications. 73, 13 ( July 2013), 44-47. DOI=10.5120/12805-0235

@article{ 10.5120/12805-0235,
author = { Ezat Soleiman, Abdelhamid Fetanat },
title = { Intrusion Detection System based on Learning Fuzzy Rules and Membership Functions using Genetic Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 13 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 44-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number13/12805-0235/ },
doi = { 10.5120/12805-0235 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:02.639745+05:30
%A Ezat Soleiman
%A Abdelhamid Fetanat
%T Intrusion Detection System based on Learning Fuzzy Rules and Membership Functions using Genetic Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 13
%P 44-47
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapid expansion of Internet in recent years, computer systems are facing increased number of security threats. Despite numerous technological innovations for information assurance, it is still very difficult to protect computer systems. Therefore, unwanted intrusions take place when the actual software systems are running. Different soft computing based approaches have been proposed to detect computer network attacks. Hybrid methods proved more effective and accurate, this paper tries to introduce how to use dynamic fuzzy rules and genetic algorithm in intrusion detection systems.

References
  1. Dieter ollmann. Computer Security, Second Edition. Wiley, New Jersey, 2002.
  2. Edward G. Amoroso, "Intrusion Detection – An Introduction to Internet Surveillance, Correlation, Trace Back, Traps and Response", Intrusion. net Books, 1999.
  3. Kendall, K. , "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems, in C. S. 1998, Massachusetts Institute of Technology: Boston
  4. Pedro A. Diaz-Gomez, "optimization of parameters for binary genetic algorithms", Doctor of philosophy, University Of Oklahoma, 2007.
  5. Kafi I. Hassan, "Adaptive algorithm for obtaining in-phase (I) and quadrature-phase (Q) pseudo-noise (PN) sequences in CDMA", Doctor of philosophy, The City University Of New York, 2005.
  6. M. Crosbie and E. Spafford, "Applying Genetic Programming to Intrusion Detection", Proceedings of the AAAI Fall Symposium, 1995
  7. S. M. Bridges and R. B. Vaughn, "Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection", Proceedings of 12th Annual Canadian Information Technology Security Symposium, pp. 109-122, 2000
  8. Chittur, A. "A Model Generation for an Intrusion Detection System Using Genetic Algorithms". http:// ww1. cs. columbia. edu/ids/publications/ gaids-thesis01. pdf. Accessed January, 2005
  9. Li, W. "A Genetic Algorithm Approach to Network Intrusion Detection". http://www. giac. org/practical/GSEC/Wei_Li_GSEC. pdf. Accessed January 2005
  10. W. Lu and I. Traore, "Detecting New Forms of Network Intrusion Using Genetic Programming", Computational Intelligence, vol. 20, pp. 3, Blackwell Publishing, Malden, pp. 475-494, 2004
  11. T. Xiao, G. Qu, S. Hariri, and M. Yousif, "An Efficient Network Intrusion Detection Method Based on Information Theory and Genetic Algorithm", Proceedings of the 24th IEEE International Performance Computing and Communications Conference (IPCCC '05), Phoenix, AZ, USA. 2005
  12. Marbin Pazos-Revilla, "FPGA based fuzzy intrusion detection system for network security", Master of science, The Faculty of Graduate School, Tennessee Technological University, May 2010.
  13. Iosif-Viorel Onut, "A fuzzy feature evaluation framework for network intrusion detection", Doctor of philosophy, the University of New Brunswick, April 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Genetic algorithm intrusion detection system IDS fuzzy systems