2004
DOI: 10.1111/j.0824-7935.2004.00247.x
|View full text |Cite
|
Sign up to set email alerts
|

Detecting New Forms of Network Intrusion Using Genetic Programming

Abstract: -How to find and detect novel o r unknown network attacks is one of the most important objectives in current intrusion detection systems. In this paper, a rule evolution approach based on Genetic Programming (GP) for detecting novel attacks on network is presented and four genetic operators namely reproduction, mutation, crossover and dropping condition operators a r e used to evolve new rules. New rules are used to detect novel o r known network attacks. A training and testing dataset proposed by DARPA is use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
50
0
6

Year Published

2005
2005
2019
2019

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 104 publications
(57 citation statements)
references
References 6 publications
1
50
0
6
Order By: Relevance
“…We plot our experiment results in Figure 3, where each point corresponds to a placement's properties in the objective space 3 The results validate our multiobjective optimisation approach and demonstrate that functional trade-offs are indeed possible for sensor placement problem. Figure 3 shows the trend that the more sensors we use, the more attacks we will be able to detect (higher detection rates), whilst the more false alarms (higher false alarm rate) we will have to dismiss.…”
Section: Experiments Resultssupporting
confidence: 55%
See 1 more Smart Citation
“…We plot our experiment results in Figure 3, where each point corresponds to a placement's properties in the objective space 3 The results validate our multiobjective optimisation approach and demonstrate that functional trade-offs are indeed possible for sensor placement problem. Figure 3 shows the trend that the more sensors we use, the more attacks we will be able to detect (higher detection rates), whilst the more false alarms (higher false alarm rate) we will have to dismiss.…”
Section: Experiments Resultssupporting
confidence: 55%
“…These experiments serve as proof of concept and to demonstrate the validity and potential of the proposed approach. Researchers have used Genetic Programming (GP) and Grammatical Evolution to determine IDS detection rules [3], but our experiments reported here report the first use of heuristic optimisation techniques to evolve optimal IDS sensor placements.…”
Section: Introductionmentioning
confidence: 99%
“…Lu and Traore [26] used GP to evolve new rules from initially created rules that cover already-known attacks. New rules are generated by four operators including: Mutation, reproduction, crossover and a dropping condition operator.…”
Section: Gp and Network Intrusionmentioning
confidence: 99%
“…ID has been approached from several different points of view up to now; many different intelligent and Soft Computing techniques (such as Genetic Programming [2,3], Data Mining [4][5][6][7][8][9][10], Expert Systems [11,12], Fuzzy Logic [13,14], or Neural Networks [15][16][17][18][19][20] among others) together with statistical [21] and signature verification [22] techniques have been applied mainly to perform a 2-class classification (normal/anomalous or intrusive/non-intrusive). Most of these systems can generate different alarms when an anomalous situation is detected, but they can not provide a general overview of what is happening inside a computer network.…”
Section: Previous Workmentioning
confidence: 99%