An Intrusion Detection System Based on NSGA-II Algorithm

Ali Tamimi, Desineni Subbaram Naidu, Sanaz Kavianpour

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Attack detection is one of the most important issues for computer networks security. Intrusion Detection System (IDS) monitors network for malicious activity. In this paper, a method is proposed to identify the attacks in IDS. This method generates rule sets for Intrusion Detection System using non-dominated sorting genetic algorithm (NSGA-II). NSGA-II is one type of multi objective genetic algorithms. This method considers features of computer connection and defines two different fitness functions for generating the rules. The advantage of this method compared with previous methods which applied Evolutionary Algorithm. Since some methods applied one fitness function or convert many objectives to single objective, they lost many features.

Original languageEnglish (US)
Title of host publicationProceedings - 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages58-61
Number of pages4
ISBN (Electronic)9781467384995
DOIs
StatePublished - Jun 14 2016
Event4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015 - Jakarta, Indonesia
Duration: Oct 29 2015Oct 31 2015

Publication series

NameProceedings - 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015

Other

Other4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015
Country/TerritoryIndonesia
CityJakarta
Period10/29/1510/31/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Keywords

  • Evolutionary Algorithms
  • Intrusion Detection System
  • Network Security
  • Non-dominated sorting genetic algorithm

Fingerprint

Dive into the research topics of 'An Intrusion Detection System Based on NSGA-II Algorithm'. Together they form a unique fingerprint.

Cite this