JOURNAL ARTICLE

Network Anomaly Detection System using Genetic Algorithm, Feature Selection and Classification

Elif Uysal‐BiyikogluGulnur DemirciogluGülsade KaleErkan BostancıMehmet Serdar GüzelSarmad N. Mohammed

Year: 2019 Journal:   2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) Vol: 2 Pages: 1-5

Abstract

Networks are dangerous environments with containing numerous security vulnerabilities and those vulnerabilities are likely to be used while attacking systems with the intent of stealing valuable information or stopping the services. A system should be protected from already-known types of attacks and also have ability to detect unknown types of attacks to prevent abduction of the information. Unknown types of attacks may give harm to the system by stopping the services that runs effective and stable. For that purpose, it has become necessary to develop a flexible and adaptable system which can collect instant data from the network, distinguish between harmless and harmful behaviors and take measures against them. The main goal of this work is to explain a network anomaly detection system that is developed using genetic algorithm and Weka classification features to fulfill the purposes stated above. The Genetic Algorithm is used to generate various individuals with the aim of determining which attributes of the individual are providing a better result about learning the behavioral pattern of the network traffic. Furthermore, Weka classifiers are applied to the train and test datasets to calculate the best fitness value, and to decide on individual's attributes that are more effective about finding the anomaly occurring in a given instant.

Keywords:
Computer science Anomaly detection Feature selection Data mining Genetic algorithm Machine learning Artificial intelligence Selection (genetic algorithm) Network security Feature (linguistics) Intrusion detection system Misuse detection Key (lock) Harm Anomaly-based intrusion detection system Computer security

Metrics

3
Cited By
0.39
FWCI (Field Weighted Citation Impact)
12
Refs
0.65
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Spam and Phishing Detection
Physical Sciences →  Computer Science →  Information Systems
© 2026 ScienceGate Book Chapters — All rights reserved.