genetic algorithm rule definition for denial of services network intrusion detection n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Genetic Algorithm Rule Definition for Denial of Services Network Intrusion Detection PowerPoint Presentation
Download Presentation
Genetic Algorithm Rule Definition for Denial of Services Network Intrusion Detection

Loading in 2 Seconds...

play fullscreen
1 / 8

Genetic Algorithm Rule Definition for Denial of Services Network Intrusion Detection - PowerPoint PPT Presentation


  • 83 Views
  • Uploaded on

Genetic Algorithm Rule Definition for Denial of Services Network Intrusion Detection. IEEE Coputational Intelligence and Natural Computing, vol 1, pp. 99-102, June 2009 Authors : Yong Wang, Dawu Gu, Xiuxia Tian and Jing Li Present : Jheng-Hen Jiang. Outline. Introduction Related Work

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

Genetic Algorithm Rule Definition for Denial of Services Network Intrusion Detection


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. Genetic Algorithm Rule Definition forDenial of ServicesNetwork Intrusion Detection IEEE Coputational Intelligence and Natural Computing, vol 1, pp. 99-102, June 2009 Authors:Yong Wang, Dawu Gu, Xiuxia Tianand Jing Li Present:Jheng-Hen Jiang

    2. Outline • Introduction • Related Work • Proposed Scheme • Experimental Result • Conclusions

    3. Indroduction • Expanding previous work and present a fitness function. • The rule will be changed by itself.

    4. Raw Intrusion Data Set Start End Data Refiner Encoding Chromosomes Generate Initial Population Evaluate Fitness Value with Rule Meets Criteria Genetic Algorithm Data Classify Normal Attacks

    5. Proposed Scheme(1/2) • Chromosome Rule Encoding Dos Records • Attr(Duration, Protocol, Service, …, Attack type) • Attr(0, icmp, ecr_i, SF, 1032, …, smurf) • Gene(0, 1, 2, 4, 408, …, 12) Hexadecimal

    6. N:Attackeventsmatrix j:Anumberofattacktype W:Aratioofnumberfeatureinthedatasettothetotalnumberfeatureinthe dataset Xn:The nth gene Wn:The weight of nth gene рn:The nth gene’s attribute CV:Correctedvector

    7. Experimental Result

    8. Conclusions • Do not have to update the rule everyday. • Suitable to continuously changing misuse detection.