Abstract

In this paper, we present a Genetic Algorithm (GA) approach with an improved initial population and selection operator, to efficiently detect various types of network intrusions. GA is used to optimize the search of attack scenarios in audit files, thanks to its good balance exploration / exploitation; it provides the subset of potential attacks which are present in the audit file in a reasonable processing time. In the testing phase the Network Security Laboratory-Knowledge Discovery and Data Mining (NSL-KDD99) benchmark dataset has been used to detect the misuse activities. By combining the IDS with Genetic algorithm increases the performance of the detection rate of the Network Intrusion Detection Model and reduces the false positive rate.

Keywords:
Computer science Intrusion detection system Benchmark (surveying) Genetic algorithm Data mining Network security Population Selection (genetic algorithm) Misuse detection Anomaly-based intrusion detection system Machine learning Computer security

Metrics

62
Cited By
4.04
FWCI (Field Weighted Citation Impact)
17
Refs
0.94
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Spam and Phishing Detection
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Network intrusion detection system by using genetic algorithm

Hamizan SuhaimiSaiful Izwan SulimanIsmail MusirinAfdallyna Fathiyah HarunRoslina Mohamad

Journal:   Indonesian Journal of Electrical Engineering and Computer Science Year: 2019 Vol: 16 (3)Pages: 1593-1593
JOURNAL ARTICLE

Intrusion detection system using hybrid Fuzzy Genetic algorithm

Sumalatha PottetiNamita Parati

Journal:   2017 International Conference on Trends in Electronics and Informatics (ICEI) Year: 2017 Pages: 613-618
JOURNAL ARTICLE

Genetic algorithm for intrusion detection system

Gözde Karataş

Year: 2016 Pages: 1341-1344
© 2026 ScienceGate Book Chapters — All rights reserved.