Posts: 1
Threads: 1
Joined: Jun 2010
Dear Sir.
I am A MTech student .Im working on Intrusion Detection in computer networ using genetic algorithm approach.I am implementing the intrusion detection algorithm using genetic algorithm tool box of Matlab.
Kindly send me the matlab code for the same.
Thanks and Regards.
Sunil Pawar.
Posts: 2
Threads: 1
Joined: Jun 2010
can u send more details about intrusion detection system
Posts: 201
Threads: 4
Joined: Jun 2010
Using Genetic Algorithm for Network Intrusion Detection
Intrusion Detection System (IDS) has become one of the hottest research areas in Computer Security in the recent years. an intrusion occurs when somebody attempts to break into an information system or do an illegel activity. There can be external and internal intruders. The intrusion detection techniques is broadly classified into 2:
-misuse detection: These are the methods that characterize known methods to penetrate a system such as a patternâ„¢ or a Ëœsignature'.
- anomaly detection:
In this technique , the Behaviors that deviate from the expected normal behavior are considered intrusions.
Based on where where they look for intrusive behavior, there can be Network-based IDS (NIDS) and Host-based IDS.
Introduction to Genetic Algorithm
It consists of a family of computational models based on principles of evolution and natural selection. A randomly selected population of chromosomes are representations of the problem to be solved and different
positions of each chromosome are encoded as bits, characters, or numbers according to the problem being dealt with.The the goodness of each chromosome is done by a evaluation function.
Genetic Algorithm Applied to Intrusion Detection
simple rules for network traffic can be evolved from genetic algorithm. normal and anomalous network connections. the condition usually refers to a match between current network
connection and the rules in IDS. an action defined by the security policies within an organization is then taken by the IDS.
-Data Representation:
all fields related with a specific network
connection have to be examined for exploiting the suspicious level. Source, destination IP address, Port number of source and destination, duration, state, protocol etc are examined to be in the specified range of values.
for full information, refer this pdf:
[attachment=3875]
Posts: 1
Threads: 0
Joined: Mar 2011
i need matlab code to classify intrusion using genatic algorithm
Posts: 6,566
Threads: 1,107
Joined: Jul 2011